Academic literature on the topic 'Authorization Policie'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Authorization Policie.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Authorization Policie"
Xu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, and Yaoxue Zhang. "A Feasible Fuzzy-Extended Attribute-Based Access Control Technique." Security and Communication Networks 2018 (June 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/6476315.
Full textSciberras, Josette, Raymond Zammit, and Patricia Vella Bonanno. "The European framework for intellectual property rights for biological medicines." Generics and Biosimilars Initiative Journal 10, no. 4 (December 15, 2021): 172–83. http://dx.doi.org/10.5639/gabij.2021.1004.022.
Full textBai, Yun, and Vijay Varadharajan. "On transformation of authorization policies." Data & Knowledge Engineering 45, no. 3 (June 2003): 333–57. http://dx.doi.org/10.1016/s0169-023x(02)00194-5.
Full textSabri, Khair Eddin. "An Algebraic Model to Analyze Role-Based Access Control Policies." Modern Applied Science 12, no. 10 (September 12, 2018): 50. http://dx.doi.org/10.5539/mas.v12n10p50.
Full textWANG, Qiang, Qiao LIU, and Zhi-guang QIN. "Change impact analysis in authorization policies." Journal of Computer Applications 31, no. 1 (March 21, 2011): 115–17. http://dx.doi.org/10.3724/sp.j.1087.2011.00115.
Full textFournet, Cédric, Andrew D. Gordon, and Sergio Maffeis. "A type discipline for authorization policies." ACM Transactions on Programming Languages and Systems 29, no. 5 (August 2, 2007): 25. http://dx.doi.org/10.1145/1275497.1275500.
Full textLi, Pei Wu. "The Research of Temporal-Based Authorization for Group-Centric Secure Information Sharing." Advanced Materials Research 143-144 (October 2010): 1223–27. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.1223.
Full textIyer, Padmavathi, and Amirreza Masoumzadeh. "Learning Relationship-Based Access Control Policies from Black-Box Systems." ACM Transactions on Privacy and Security 25, no. 3 (August 31, 2022): 1–36. http://dx.doi.org/10.1145/3517121.
Full textSchwartz, Aaron L., Troyen A. Brennan, Dorothea J. Verbrugge, and Joseph P. Newhouse. "Measuring the Scope of Prior Authorization Policies." JAMA Health Forum 2, no. 5 (May 28, 2021): e210859. http://dx.doi.org/10.1001/jamahealthforum.2021.0859.
Full textBecker, Moritz Y., and Sebastian Nanz. "A logic for state-modifying authorization policies." ACM Transactions on Information and System Security 13, no. 3 (July 2010): 1–28. http://dx.doi.org/10.1145/1805974.1805976.
Full textDissertations / Theses on the topic "Authorization Policie"
Calzavara, Stefano <1985>. "Static verification and enforcement of authorization policies." Doctoral thesis, Università Ca' Foscari Venezia, 2013. http://hdl.handle.net/10579/3044.
Full textThe thesis addresses the problem of the verification and enforcement of authorization policies through static analysis techniques. The main contributions are threefold: a formal semantics for grsecurity, which allows us to effectively validate a number of desirable security properties for role-based access control systems; an extension of RCF based on affine logic, to guarantee the enforcement of expressive authorization policies predicating on resource usage bounds; a verification methodology for Android applications, targeted to the enforcement of an access control policy robust against privilege escalation attacks. All the proposed techniques are proved sound and the issues related to their practical implementation are discussed.
Truong, Anh. "Efficient Automated Security Analysis of Complex Authorization Policies." Doctoral thesis, Università degli studi di Trento, 2015. https://hdl.handle.net/11572/368624.
Full textChatvichienchai, Somchai. "Studies on Translating Access Authorization Policies of XML Documents." 京都大学 (Kyoto University), 2004. http://hdl.handle.net/2433/147569.
Full textBai, Yun, of Western Sydney Nepean University, and School of Computing and Information Technology. "On formal specification of authorization policies and their transformations : thesis." THESIS_XXX_CIT_Bai_Y.xml, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Full textDoctor of Philosophy (PhD)
Bai, Yun. "On formal specification of authorization policies and their transformations : thesis." Thesis, View thesis View thesis, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Full textBai, Yun. "On formal specification of authorization policies and their transformations : thesis /." View thesis View thesis, 2000. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030612.090157/index.html.
Full text"A thesis submitted for the degree of Doctor of Philosophy at University of Western Sydney - Nepean." "September 2000." Bibliography : leaves 141-150.
Kibwage, Stephen Sakawa. "Role-Based Access Control Administration of Security Policies and Policy Conflict Resolution in Distributed Systems." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/30.
Full textLima, Paulo Ricardo Barbieri Dutra. "SGPCA SISTEMA GERENCIADOR DE POLÍTICAS DE CONTROLE DE ACESSO." Universidade Federal de Santa Maria, 2008. http://repositorio.ufsm.br/handle/1/8050.
Full textInformation is the most precious assets to organizations; hence it is necessary to have mechanisms to protect it and to make it available only to whom have factual permission to use it. Considering the need for protection of the information in organizations it is proposed in this work a system to manage access control policies which can be easily used, that is, it does not require any knowledge of policies codification language. Further, as the creation of new policies could generate conflicts with existent ones, this work also proposes algorithms which manage automatically, in a period of policies creation, the control of some kinds of conflicts, such as interest conflicts. As result, we have offer a Access Control Police Management System that enable that the process of generation and editing policies occurs easily and without conflicts. The reference model used in this work refers to health organizations; however this study can be applied in other fields.
A informação é o bem mais valioso para as organizações, logo deve-se ter mecanismos para que ela possa ser bem protegida e que seja disponível somente para quem tem real permissão de utilizá-la. Dado esta necessidade de proteção da informação nas organizações, propõe-se neste trabalho um sistema de gerenciamento de políticas de controle de acesso, que possa ser utilizado de forma facilitada, ou seja, não requerendo conhecimento de linguagem de codificação de políticas. Adicionalmente, como a criação de novas políticas pode gerar conflitos com as já existentes, este trabalho propõe também algoritmos que gerenciam automaticamente, em tempo de criação das políticas, o controle de alguns tipos de conflitos, tais como conflitos de interesse. Como resultado tem-se um Sistema Gerenciador de Políticas de Controle de Acesso que possibilita que o processo de geração e edição de políticas ocorra de maneira facilitada e sem conflitos. O modelo de referência utilizado neste trabalho refere-se no âmbito de organizações da saúde, mas o estudo realizado pode ser utilizado em outras áreas.
Blanc, François. "Les engagements dans le droit français des concentrations." Thesis, Paris 2, 2012. http://www.theses.fr/2012PA020059.
Full textAt first sight, the mergers’s control illustrates the modern role played by the State in the economy: the aim is not to organize the markets anymore, but to control from time to time one or several particular operators. The liberal State submit the companies’s merging processes to prior authorization, so as to make sure they do not negatively affect the competition. Nevertheless, in the silence of the law, everything goes as if the administration was using mergers as drivers of the markets’s reorganization. This process is evenmore subtil because it implies closely the companies themselves: everything depends on the commitments the companies offer to the administration, in order to prevent the non competitive effects of their project. These commitments are indeed undergoing a major legal change: once issued, they become a measure of economic restriction, embedded in the administration’s authorization. This process, that has been developed from the time of planned economy, suggests a certain permanency of the French law, despite the economic goals’s variation. Yet, these commitments constrain the parties about to merge: on the one hand regarding their actions towards other operators on the market, and on the other hand, regarding their relation with the administration : at the same time they direct the merger according to the stakeholders, and extend the administrative control. In short, when embedding the commitments in its act, the administration first changes the relations between the parties and the stakeholders, then follows up the relations’s execution. Thus, its intervention swifts ratione temporis, -from the merger in progress to the merger achieved, ratione personae, from the parties to the stakeholders’ operations, and ratione materia, from the merger to the market. Time has gone when the administration used to build the market directly ; now it uses to this end the companies that have to require her authorization
BARLETTA, Michele. "Authorization Policies in Security-Sensitive Web Services and Applications - Formal Modeling and Analysis." Doctoral thesis, 2012. http://hdl.handle.net/11562/398135.
Full textThe security of distributed service-oriented applications is crucial in several ap- plications such as e-commerce and e-governance, supporting business and administrative transactions among several parties over the Internet. Their development involves security issues ranging from authentication to the management of the access control on shared resources according to given business and legal models. The specification of security-sensitive applications spans several levels of abstraction, e.g., the protocol for exchanging messages, the set of interface functionalities, the types of the manipulated data, the workflow, the authorization policy, etc. A com- mon design paradigm in distributed applications consists of clearly separating the enforcement of policies at the authorization policy level and of the process work- flow at the workflow level of the applications, so that the interplay between these two levels is abstracted away. While such an approach is attractive because it is quite simple and permits one to reason about crucial properties of the policies un- der consideration, it does not provide the right level of abstraction to specify and reason about the way the workflow may interfere with the policies, and vice versa. For example, the creation of a certificate as a side effect of a workflow operation may enable a policy rule to fire and grant access to a certain resource; without executing the operation, the policy rule should remain inactive. Similarly, policy queries may be used as guards for workflow transitions. This thesis focuses on design-time analysis of security-sensitive applications and presents the following main contributions. As the first contribution, I developed a formal framework for the specification and automated analysis of distributed security-sensitive applications organized in two levels: one for the workflow and one for the authorization policies. I formalized the interface functionalities that allow the policy level and the workflow level to interact in a principled way so as to enable the specification of the behavior of distributed systems. As the sec- ond contribution, focusing on the authorization policy level, I proposed a logical framework called DKAL-light, based on the DKAL authorization language, suit- able to specify the dynamic aspects needed to model the communication level and capable to model some forms of human intervention (non-mechanizable activities), e.g. issuing of credentials or certificates, crucial for the correct execution of the system. As the third contribution, I developed “ad-hoc” automated verification techniques for a restricted, but useful in practice, class of secure-sensitive applications in order to solve practical instances of reachability problems I defined. I have also shown how message sequence charts and suitably defined causality graphs can drive and foster the automated verification (by SMT solvers) of security-sensitive applications. Finally, a prototype tool called WSSMT for the mechanization of the two-level framework is presented. As concrete examples, I considered industrial case studies arising in e-business and e-government area in order to show the suitability and flexibility of our approach and our prototype tool.
Books on the topic "Authorization Policie"
Colorado Commission on Higher Education. The Degree Authorization Act: Statutes and policies pertaining to authorization to operate as a postsecondary education institution and to award credits and degrees in Colorado. Denver, Colo: Colorado Commission on Higher Education, 1994.
Find full textDomestic politics and multilateral authorization for war. Chicago: University of Chicago Press, 2011.
Find full textDivision, Alaska Treasury. General investment policies: A review of the bases for the policies, including relevant objectives, factors, and standards, as well as responsibilities, authorizations, and limitations. [Juneau, Alaska]: State of Alaska, Dept. of Revenue, Treasury Division, 1990.
Find full textUS DEPARTMENT OF AGRICULTURE. Draft record of decision: North Fork Eagle Creek Wells special use authorization. New Mexico]: Forest Service, Southwestern Region, Lincoln National Forest, 2015.
Find full textUS DEPARTMENT OF AGRICULTURE. Final environmental impact statement: North Fork Eagle Creek Wells special use authorization. New Mexico]: Forest Service, Southwestern Region, Lincoln National Forest, 2015.
Find full textUS GOVERNMENT. Authorization for Use of Military Force Against Iraq Resolution of 2002. [Washington, D.C: U.S. G.P.O., 2002.
Find full textUnited States. Joint Task Force Transformation Initiative. Guide for security authorization of federal information systems: A security life cycle approach. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008.
Find full textUnited States. Congress. Senate. Committee on Governmental Affairs. District of Columbia Police Authorization and Expansion Act of 1989: Report of the Committee on Governmental Affairs, United States Senate, to accompany H.R. 1502 ... Washington: U.S. G.P.O., 1989.
Find full textUS GOVERNMENT. An Act to Amend Chapter 443 of Title 49, United States Code, to Extend the Authorization of the Aviation Insurance Program, and for Other Purposes. [Washington, D.C.?: U.S. G.P.O., 1997.
Find full textUnited States. Department of Defense. Office of the Secretary of Defense. Military power of the People's Republic of China: A report to Congress pursuant to the National Defense Authorization Act, fiscal year 2000. [Washington, D.C.?]: Office of the Secretary of Defense, 2009.
Find full textBook chapters on the topic "Authorization Policie"
Arthur, Will, David Challener, and Kenneth Goldman. "Extended Authorization (EA) Policies." In A Practical Guide to TPM 2.0, 217–48. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6584-9_14.
Full textBarker, Steve. "Logical Approaches to Authorization Policies." In Logic Programs, Norms and Action, 349–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29414-3_19.
Full textNait-Bahloul, Sarah, Emmanuel Coquery, and Mohand-Saïd Hacid. "Authorization Policies for Materialized Views." In IFIP Advances in Information and Communication Technology, 525–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30436-1_43.
Full textFrau, Simone, and Mohammad Torabi Dashti. "Analysis of Communicating Authorization Policies." In Security and Trust Management, 97–112. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38004-4_7.
Full textRuan, Chun, and Vijay Varadharajan. "Integration of Graph Based Authorization Policies." In Lecture Notes in Computer Science, 359–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11875604_42.
Full textFournet, Cédric, Andrew D. Gordon, and Sergio Maffeis. "A Type Discipline for Authorization Policies." In Programming Languages and Systems, 141–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31987-0_11.
Full textZhang, Boyun, Puneet Gill, Nelu Mihai, and Mahesh Tripunitara. "Granularity and Usability in Authorization Policies." In Communications in Computer and Information Science, 68–86. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93956-4_5.
Full textArdagna, C. A., E. Damiani, S. De Capitani di Vimercati, and P. Samarati. "Towards Privacy-Enhanced Authorization Policies and Languages." In Data and Applications Security XIX, 16–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11535706_2.
Full textBertino, Elisa, and Elena Ferrari. "Administration policies in a multipolicy authorization system." In Database Security XI, 341–55. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5_21.
Full textRobinson, Philip, Florian Kerschbaum, and Andreas Schaad. "From Business Process Choreography to Authorization Policies." In Data and Applications Security XX, 297–309. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11805588_21.
Full textConference papers on the topic "Authorization Policie"
Becker, Moritz Y., Jason F. Mackay, and Blair Dillaway. "Abductive Authorization Credential Gathering." In 2009 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2009. http://dx.doi.org/10.1109/policy.2009.23.
Full textIranmanesh, Zeinab, Morteza Amini, and Rasool Jalili. "A Logic for Multi-domain Authorization Considering Administrators." In 2008 IEEE Workshop on Policies for Distributed Systems and Networks - POLICY. IEEE, 2008. http://dx.doi.org/10.1109/policy.2008.23.
Full textWinslett, Marianne. "Policy-Driven Distributed Authorization: Status and Prospects." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.35.
Full textDobmeier, Wolfgang, and Gunther Pernul. "Towards Privacy-Aware Handling of Authorizations." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.47.
Full textConstandache, Ionut, Daniel Olmedilla, and Frank Siebenlist. "Policy-Driven Negotiation for Authorization in the Grid." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.36.
Full textStihler, Maicon, Altair O. Santin, and Arlindo L. Marcon. "Managing distributed UCONabc policies with authorization assertions and policy templates." In 2015 20th IEEE Symposium on Computers and Communication (ISCC). IEEE, 2015. http://dx.doi.org/10.1109/iscc.2015.7405583.
Full textRosendo, Daniel, Judith Kelner, and Patrícia Endo. "A High-level Authorization Framework for Software-Defined Networks." In XXXVI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/sbrc_estendido.2018.14177.
Full textLaborde, Romain, Marwan Cheaito, Francois Barrere, and Abdelmalek Benzekri. "Toward Self-Contained Authorization Policies." In 2010 IEEE International Symposium on Policies for Distributed Systems and Networks. IEEE, 2010. http://dx.doi.org/10.1109/policy.2010.18.
Full textBartsch, Steffen, and M. Angela Sasse. "Guiding decisions on authorization policies." In the 27th Annual ACM Symposium. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2245276.2232015.
Full textDa Silva, Carlos Eduardo, Welkson De Medeiros, and Silvio Sampaio. "PEP4Django A Policy Enforcement Point for Python Web Applications." In IX Workshop de Gestão de Identidades Digitais. Sociedade Brasileira da Computação, 2019. http://dx.doi.org/10.5753/wgid.2019.14021.
Full textReports on the topic "Authorization Policie"
Gage, B., B. Kosinski, and H. Shieh. Session Authorization Policy Element. RFC Editor, April 2003. http://dx.doi.org/10.17487/rfc3520.
Full textBarbir, A., O. Batuner, A. Beck, T. Chan, and H. Orman. Policy, Authorization, and Enforcement Requirements of the Open Pluggable Edge Services (OPES). RFC Editor, August 2004. http://dx.doi.org/10.17487/rfc3838.
Full textLavadenz, Magaly, Jongyeon Ee, Elvira Armas, and Grecya López. Leaders’ Perspectives on the Preparation of Bilingual/Dual Language Teachers. Center for Equity for English Learners, 2021. http://dx.doi.org/10.15365/ceel.policy.10.
Full textCochrane, C. B. Summary and Assessment Acquisition Policy Implications: National Defense Authorization Act for Fiscal Year 1993 and Department of Defense Appropriations Act for Fiscal Year 1993. Fort Belvoir, VA: Defense Technical Information Center, January 1993. http://dx.doi.org/10.21236/ada273210.
Full textBush, Joseph, Eileen Westervelt, Brian Clark, David Schwenk, Stephen Briggs, Daniel Shepard, Michael Cary Long, Tapan Patel, Melanie Johnson, and Eric Lynch. Installation utility monitoring and control system technical guide. Engineer Research and Development Center (U.S.), August 2022. http://dx.doi.org/10.21079/11681/45081.
Full textBilingual Authorization Program Standards Content Analysis White Paper. Center for Equity for English Learners, 2020. http://dx.doi.org/10.15365/ceel.statement.2020.1.
Full text