Dissertations / Theses on the topic 'Computer networks – Access control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Computer networks – Access control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Withrow, Gary W. "An access control middleware application." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/GWithrow2006.pdf.
Full textFisher, Craig. "Network access control disruptive technology? /." [Denver, Colo.] : Regis University, 2008. http://165.236.235.140/lib/JFisher2007.pdf.
Full textNayak, Ankur Kumar. "Flexible access control for campus and enterprise networks." Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33813.
Full textDuff, Kevin Craig. "Network-layer reservation TDM for ad-hoc 802.11 networks." Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1146/.
Full textZhang, Zhixiong. "Scalable role & organization based access control and its administration." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3110.
Full textVita: p. 121. Thesis directors: Ravi S. Sandhu, Daniel Menascé. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed July 7, 2008). Includes bibliographical references (p. 113-120). Also issued in print.
Manian, Vijay. "Access control model for Distributed Conferencing System." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000570.
Full textVillegas, Wilfred. "A trust-based access control scheme for social networks." Thesis, McGill University, 2008. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=22020.
Full textLes données personnelles publiées sur internet par l'entremise des nouveaux réseaux sociaux virtuels présentent des défis considérables en ce qui attrait à l'échange numérique. Cette thèse propose un système de contrôle d'accès appelé Personal Data Access Control, ou PDAC, qui permet aux utilisateurs d'échanger leurs données personnelles avec leurs amis de façon mesurée, en utilisant un calcul de confiance. Ce calcul de confiance utilise comme critères d'évaluation les interactions antérieures entre l'utilisateur et chacun de ses amis afin de classer chacune de ses connaissances dans une de trois zones de protection. Ces zones délimitent le niveau d'accès accordé aux données de l'utilisateur. De plus, l'utilisateur peut assigner certains amis come vérificateurs qui donnent leur approbation et ainsi détermine en toute confidentialité qui devrait avoir accès a ses données. Nos résultats d'analyse démontrent que le PDAC accorde privilèges d'accès aux données de façon efficace. Ces simulations démontrent aussi que le PDAC préserve la confidentialité en saisissant les niveaux de confiance qui existe dans les réseaux sociaux virtuels d'aujourd'hui actuels.
Kohagura, Monique Sachie. "Local coordination medium access control for wireless sensor networks." Online access for everyone, 2008. http://www.dissertations.wsu.edu/Thesis/Summer2008/m_kohagura_050808.pdf.
Full textFu, Kevin E. (Kevin Edward) 1976. "Integrity and access control in untrusted content distribution networks." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34464.
Full textVita.
Includes bibliographical references (p. 129-142).
A content distribution network (CDN) makes a publisher's content highly available to readers through replication on remote computers. Content stored on untrusted servers is susceptible to attack, but a reader should have confidence that content originated from the publisher and that the content is unmodified. This thesis presents the SFS read-only file system (SFSRO) and key regression in the Chefs file system for secure, efficient content distribution using untrusted servers for public and private content respectively. SFSRO ensures integrity, authenticity, and freshness of single-writer, many-reader content. A publisher creates a digitally-signed database representing the contents of a source file system. Untrusted servers replicate the database for high availability. Chefs extends SFSRO with key regression to support decentralized access control of private content protected by encryption. Key regression allows a client to derive past versions of a key, reducing the number of keys a client must fetch from the publisher. Thus, key regression reduces the bandwidth requirements of publisher to make keys available to many clients.
(cont.) Contributions of this thesis include the design and implementation of SFSRO and Chefs; a concrete definition of security, provably-secure constructions, and an implementation of key regression; and a performance evaluation of SFSRO and Chefs confirming that latency for individual clients remains low, and a single server can support many simultaneous clients.
by Kevin E. Fu.
Ph.D.
Yu, Fan. "Self organization in medium access control for wireless ad hoc and sensor networks." Diss., Connect to online resource - MSU authorized users, 2008.
Find full textWang, Xudong. "Medium access control protocols for next generation wireless networks." Diss., Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/13267.
Full textSanders, Derek T. Hamilton John A. "An adaptive single-hop medium access control layer for noisy channels." Auburn, Ala, 2009. http://hdl.handle.net/10415/1720.
Full textRubio, Medrano Carlos Ernesto. "A formal approach to specifying access control security features of Java modules." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textSundaresan, Karthikeyan. "Medium access control for ad hoc networks with switched-beam antennas." Thesis, Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/13320.
Full textCoetzee, Marijke. "WSACT - a model for Web Services Access Control incorporating Trust." Thesis, Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-07102008-075251.
Full textSaraireh, Mohammad Suleiman Abdul-Qader. "Medium access control mechanisms for quality of service in wireless computer networks." Thesis, Sheffield Hallam University, 2006. http://shura.shu.ac.uk/20325/.
Full textStucki, Eric Thomas. "Medium Access Control and Networking Protocols for the Intra-Body Network." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1182.pdf.
Full textHsu, Chilo Gerald 1959. "CRYPTOGRAPHIC PROTECTION IN A TYPE 10BASE5 LOCAL AREA NETWORK INTERFACE." Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/277192.
Full textXiao, Chunpeng. "Advanced link and transport control protocols for broadband optical access networks." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-11082006-183908/.
Full textChang, Gee-Kung, Committee Chair ; Zhou, G.Tong, Committee Member ; Copeland, John, Committee Member ; Riley, George, Committee Member ; Ingram, Mary Ann, Committee Member ; Ammar, Mostafa, Committee Member.
Kuntz, Romain. "Medium Access Control Facing the Dynamics of Wireless Sensor Networks." Phd thesis, Université de Strasbourg, 2010. http://tel.archives-ouvertes.fr/tel-00521389.
Full textChen, Shi. "An energy-efficient media access control protocol for wireless sensor networks /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?COMP%202006%20CHEN.
Full textKockan, Sinem. "Admission control and profitability analysis in dynamic spectrum access data networks." Thesis, Boston University, 2013. https://hdl.handle.net/2144/21194.
Full textRecent regulations by the Federal Communication Commission (FCC) enable network service providers to lease their spectrum to short-term leased secondary users for opportunistic usage. Driven by earlier studies on spectrum leasing for voice and streaming traffic, this thesis derives optimal policies for the admission control of secondary users carrying data traffic. Additionally, it establishes profitability conditions of spectrum leasing. We consider a processor sharing network where bandwidth is equally shared among all users with no partitioning. We further consider homogeneous and elastic data traffic: All the users have the same traffic characteristics and adjust their access rate to the available bandwidth in the network. The contributions of this thesis are the following: First, we analyze the joint problem of bandwidth allocation and admission control of secondary users. Under the assumption of Poisson session arrivals and balanced bandwidth allocations, we show that the steady state distributions of the number of active users in the network are insensitive to track characteristics beyond their means. This result holds for arbitrary occupancy-based admission control policies. Next, we prove that the optimal occupancy-based admission control policy of secondary users is of threshold type, which means that secondary user arrivals are accepted when the total number of active users in the network is below a certain threshold; otherwise, they are rejected. Finally, under optimal occupancy-based admission control, we characterize profitable prices. We show that profitability is insensitive to the secondary demand function. We identify a price, referred to as the break-even price, that makes opening the network for secondary spectrum access profitable. Thus, we show that admitting secondary users when the network is empty is profitable for any price greater than the break-even price. Remarkably, all of our results hold for realistic data traffic models assuming Poisson session arrivals and general flow size distributions.
2031-01-01
Deas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.
Full textSrinivas, Preethi. "Private Key Allocation based Access Control Scheme for Social Networks." Miami University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=miami1281839737.
Full textManian, Vijay. "Voting enabled role-based access control model for distributed collaboration." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0011941.
Full textTang, Wai-hung, and 鄧偉雄. "An anonymity scheme for file retrieval systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40887972.
Full textLevine, David A. "Resource allocation, call admission, and media access control protocols for wireless multimedia networks." Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/14766.
Full textSingh, Arundhati 1978. "SIREN : a SQL-based implementation of role-based access control (RBAC) for enterprise networks." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87870.
Full textIncludes bibliographical references (leaves 69-71).
by Arundhati Singh.
M.Eng.
LaMore, Robert L. "CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FLaMore.pdf.
Full textRigby, Simon. "Key management in secure data networks." Thesis, Queensland University of Technology, 1987. https://eprints.qut.edu.au/36825/1/36825_Rigby_1987.pdf.
Full textChan, Kevin Sean. "Towards securing networks of resource constrained devices a study of cryptographic primitives and key distribution schemes /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26651.
Full textCommittee Chair: Fekri, Faramarz; Committee Member: James McClellan; Committee Member: John Copeland; Committee Member: Steven McLaughlin; Committee Member: Yajun Mei. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Matsson, Carl Philip. "Securing Microsoft Azure : Automatic Access Control List Rule Generation to Secure Microsoft Azure Cloud Networks." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-55295.
Full textCORDEIRO, CARLOS DE MORAIS. "MEDIUM ACCESS CONTROL PROTOCOLS AND ROUTING STRATEGIES FOR WIRELESS LOCAL AND PERSONAL AREA NETWORKS." University of Cincinnati / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1070579302.
Full textAlmantheri, Hamed. "Computer wireless networks : a design plan for building wireless networks using IEEE 802.11 standard." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FAlmantheri.pdf.
Full textBodriagov, Oleksandr. "Social Networks and Privacy." Licentiate thesis, KTH, Teoretisk datalogi, TCS, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166818.
Full textCentraliserade sociala online nätverk utgör ett hot mot användarnas integritet. Detta eftersom leverantörer av sociala nätverkstjänster har obegränsad tillgång till användarnas information. Decentraliserade sociala nätverk löser integritetsproblemet genom att eliminera leverantörer och ge användarna kontroll över deras data. Innebörden av detta är att användarna själva får bestämma vem som får tillgång till deras data. Även om det finns flera förslag och vissa framsteg i utvecklingen avseende integritetsbevarande decentraliserade sociala nätverk, har målet om säkra, effektiva, och tillgängliga sociala nätverk i en decentraliserad miljö inte uppnåtts fullt ut. Denna avhandling bidrar till forskning inom säkerhet avseende sociala nätverk med fokus på decentraliserade sociala nätverk. Avhandlingen inriktas på krypteringsbaserad åtkomstkontroll och hantering av kryptografiska nycklar (som krävs för denna åtkomstkontroll) med hjälp av användarkonton med lösenordsbaserad inloggning i decentraliserade sociala nätverk. Först undersöker denna avhandling krav på kryptering för decentraliserade sociala nätverk och föreslår utvärderingskriterier. Dessa utvärderingskriterier används sedan för bedömning av befintliga krypteringsbaserade system för åtkomstkontroll. Vår utredning visar att samtliga garanterar sekretess av själva innehållet. Integritet av information om innehållet eller åtkomstprinciper är dock inte skyddat alls, alternativt skyddade på bekostnad av systemets prestanda och flexibilitet. Vi lyfter fram potentialen i två klasser av integritetsbevarande system i DOSN sammanhang: broadcast-krypteringssystem med dolda tillgångsstrukturer och predikat krypteringssystem; vi föreslår användning av dessa system. Båda dessa klasser innehåller system som uppvisar önskvärda egenskaper och uppfyller kriterier på ett bättre sätt. För det andra analyserar avhandlingen predikat kryptering och anpassar denna till DOSN sammanhang, eftersom det är för dyrt att använda som det är. Vi föreslår en ”univariate polynomial construction” för åtkomstprinciper i predikat kryptering som drastiskt ökar systemets prestanda, men läcker någon del av åtkomstprincipen till användare med åtkomsträttigheter. Vi använder Bloom-filter för att minska dekrypteringstiden och indikera objekt som kan dekrypteras av en viss användare. Genom att göra ett experiment med nyhetsflödessammansättning visas att det anpassade systemet ger goda resultat och därmed användarupplevelse. För det tredje presenterar avhandlingen en lösning på problemet avseende hanteringen av kryptografiska nycklar för autentisering och kommunikation mellan användare i decentraliserade sociala online nätverk. Vi föreslår en lösenordsbaserad inloggningsprocedur för peer-to-peer (P2P) miljön, som gör att användaren som passerar autentisering får återvinna en uppsättning kryptografiska nycklar som krävs för applikationen. Förutom lösenordsinloggning presenterar vi också stödprotokoll för att ge relaterat funktionalitet, såsom inloggning med lagrade lösenord, lösenordsbyte, och återställning av bortglömda lösenord. Kombinationen av dessa protokoll tillåter simulera lösenordsinloggning i centraliserade system. Prestandautvärderingen visar att tiden som krävs för inloggning är inom acceptabla gränser.
QC 20150602
Singh, Aameek. "Secure Management of Networked Storage Services: Models and Techniques." Diss., Available online, Georgia Institute of Technology, 2007, 2007. http://etd.gatech.edu/theses/available/etd-04092007-004039/.
Full textLiu, Ling, Committee Chair ; Aberer, Karl, Committee Member ; Ahamad, Mustaque, Committee Member ; Blough, Douglas, Committee Member ; Pu, Calton, Committee Member ; Voruganti, Kaladhar, Committee Member.
Irwin, Barry Vivian William. "A framework for the application of network telescope sensors in a global IP network." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1004835.
Full textZhang, Zhen. "Delivering mobile services to mobile users in open networks: Quality of service, authentication and trust-based access control." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27745.
Full textZhang, Yan. "Secure and Spectrally-Efficient Channel Access in Multi-Channel Wireless Networks." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/577214.
Full textQazi, Hasham Ud Din. "Comparative Study of Network Access Control Technologies." Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8971.
Full textThis thesis presents a comparative study of four Network Access Control (NAC) technologies; Trusted Network Connect by the Trusted Computing group, Juniper Networks, Inc.’s Unified Access Control, Microsoft Corp.’s Network Access Protection, and Cisco Systems Inc.’s Network Admission Control. NAC is a vision, which utilizes existing solutions and new technologies to provide assurance that any device connecting to a network policy domain is authenticated and is subject to the network’s policy enforcement. Non-compliant devices are isolated until they have been brought back to a complaint status. We compare the NAC technologies in terms of architectural and functional features they provide.
There is a race of NAC solutions in the marketplace, each claiming their own definition and terminology, making it difficult for customers to adopt such a solution, resulting in much uncertainty. The NAC paradigm can be classified into two categories: the first category embraces open standards; the second follows proprietary standards. By selecting these architectures, we cover a representative set of proprietary and open standards-based NAC technologies.
This study concludes that there is a great need for standardization and interoperability of NAC components and that the four major solution proposals that we studied fall short of the desired interoperability. With standards, customers have the choice to adopt solution components from different vendors, selecting, what is commonly referred to as the best of breed. One example for a standard technology that all four NAC technologies that we studied did adopt is the IEEE’s 802.1X port-based access control technology. It is used to control endpoint device access to the network.
One shortcoming that most NAC architectures (with the exception of Trusted Network Connect) have in common, is the lack of a strong root-of-trust. Without it, clients’ compliance measurements cannot be trusted by the policy server whose task is to assess each client’s policy compliance.
Low, Gregory Norman. "A software licensing framework." Thesis, Queensland University of Technology, 1998.
Find full textBurdis, Keith Robert. "Distributed authentication for resource control." Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006512.
Full textLooi, Mark H. "Authentication for applications in computer network environments using intelligent tokens." Thesis, Queensland University of Technology, 1995.
Find full textButun, Ismail. "Prevention and Detection of Intrusions in Wireless Sensor Networks." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4449.
Full textBrownfield, Michael I. "Energy-efficient Wireless Sensor Network MAC Protocol." Diss., This resource online, 2006. http://scholar.lib.vt.edu/theses/available/etd-04102006-170423/.
Full textJAIN, VIVEK. "ON-DEMAND MEDIUM ACCESS IN HETEROGENEOUS MULTIHOP WIRELESS NETWORKS." University of Cincinnati / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1177508938.
Full textCoelho, Jose Manuel dos Santos. "Underwater Acoustic Networks : evaluation of the impact of Media Access Control on latency, in a delay constrained network /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FCoehlo.pdf.
Full textGalland, Alban. "Distributed data management with access control : social Networks and Data of the Web." Phd thesis, Université Paris Sud - Paris XI, 2011. http://tel.archives-ouvertes.fr/tel-00640725.
Full textNguyen, Tuan Dung. "Performance evaluation of optical packet switching technology : access control, resource allocation and QoS management for metropolitan and access networks." Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-00688808.
Full textMacdonell, James Patrick. "MiniCA: A web-based certificate authority." CSUSB ScholarWorks, 2007. https://scholarworks.lib.csusb.edu/etd-project/3256.
Full text