Academic literature on the topic 'Security object'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security object.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security object"
Helmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (September 1, 2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.
Full textBAI, YUN, and YAN ZHANG. "ARTIFICIAL INTELLIGENCE IN DATABASE SECURITY." International Journal of Pattern Recognition and Artificial Intelligence 18, no. 01 (February 2004): 3–17. http://dx.doi.org/10.1142/s0218001404003022.
Full textFarid, Miftah, and Ajeng Ayu Adhisty. "STATE ACTION AS AN INDIVIDUAL SECURITY THREAT IN CASE OF CYBERCRIME SECURITIZATION." Jurnal Pertahanan 5, no. 3 (December 2, 2019): 77. http://dx.doi.org/10.33172/jp.v5i3.589.
Full textThuraisingham, Bhavani, Ravi Sandhu, and T. C. Ting. "Security for object-oriented systems." ACM SIGPLAN OOPS Messenger 5, no. 2 (April 1994): 77–78. http://dx.doi.org/10.1145/260304.260325.
Full textKusumah, Angga, and Aryani Witasari. "Law Enforcement on Fiducian Security Objects Due to Withdrawal of Fiducia Security Objects." Law Development Journal 3, no. 1 (March 7, 2021): 38. http://dx.doi.org/10.30659/ldj.3.1.38-43.
Full textHama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (June 2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.
Full textAli Andre, Julfikar. "SISTEM SECURITY WEBCAM DENGAN MENGGUNAKAN MICROSOFT VISUAL BASIC (6.0)." Rabit : Jurnal Teknologi dan Sistem Informasi Univrab 1, no. 2 (July 10, 2016): 46–58. http://dx.doi.org/10.36341/rabit.v1i2.23.
Full textFeng, Dan, Junjian Chen, Jingning Liu, and Zhikun Wang. "BLESS: Object level encryption security for object-based storage system." Mathematical and Computer Modelling 55, no. 1-2 (January 2012): 188–97. http://dx.doi.org/10.1016/j.mcm.2011.02.024.
Full textOleynik, P. P., and S. M. Salibekyan. "Model of security for object-oriented and object-attributed applications." Proceedings of the Institute for System Programming of the RAS 28, no. 3 (2016): 35–50. http://dx.doi.org/10.15514/ispras-2016-28(3)-3.
Full textOlha, SONIUK. "CONCEPTUAL AND CATEGORICAL APPARATUS OF SECURITY SCIENCE." Foreign trade: economics, finance, law 117, no. 4 (September 10, 2021): 85–95. http://dx.doi.org/10.31617/zt.knute.2021(117)08.
Full textDissertations / Theses on the topic "Security object"
Sethi, Mohit. "Security in Smart Object Networks." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104168.
Full textInternet of Things (IoT, ”Föremålens Internet") syftar på en sammankopplad värld där fysiska apparater är sömlöst integrerade till Internet och blir aktiva deltagare i affärslivs-, informations- och sociala processer. Detta innefattar sammankopplingen av ett stort antal heterogeniskt nätverkade enheter och nätverk. Uppkomsten av teknologier som Zigbee, låg energi Bluetooth och inbyggda sensorer har förvandlat enkla fysiska apparater till smarta objekt som kan förstå och reagera till sin omgivning. Dessa smarta objekt utgör byggstenarna för Föremålens Internet. Kommunikationsinfrastrukturen för dessa objekt bygger på en utvidgning av internetprotokollstacken. Även om behovet av säkerhet är allmänt känt, finns det inget konsensus om hur IP-baserade internetsäkerhetsprotokoll kan tillämpas i resursbegränsade smartobjektnätverk. I denna avhandling utvecklas en ny säker och energisnål kommunikationsmodell för Constrained Application Protocol (CoAP, “Begränsat applikationsprotokoll"), ett lätt kommunikationsprotokoll avsett för smartobjektnätverk. Avhandlingen bidrar till standardiseringen av den generiska kommunikationsarkitekturen genom att tillsätta säkerhets- och delegationskomponenter för smarta objekt som sover under en stor del av sin operativa fas. Denna arkitektur garanterar dataintegritet och autenticitet över en flerhopps nätverkstopologi. Arkitekturen bidrar också med en återspeglingsmekanism som använder sig av en proxyserver för att erbjuda data för sovande smarta objekts del, vilket låter dem agera som alltid-online webbservrar. I avhandlingen utvecklas också en fungerande prototypimplementation av arkitekturen. Säkerhetsegenskaperna i den arkitektur som presenteras i denna avhandling är baserade på användningen av stark publik-nyckel kryptering. I motsatts till den allmänna förväntningen, visar prestationsbedömningen i denna avhandling att asymmetrisk kryptering med publik nyckel kan tillämpas i 8-bitars mikrokontrollrar utan att ändra på de underliggande kryptografiska algoritmerna.
Yialelis, Nikolaos. "Domain-based security for distributed object systems." Thesis, Imperial College London, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.244056.
Full textTjäder, Hampus. "End-to-end Security Enhancement of an IoT Platform Using Object Security." Thesis, Linköpings universitet, Informationskodning, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138838.
Full textBorison, Torbjorn. "Object Synchronization and Security for Mobile Communications Devices." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93276.
Full textMurray, Toby. "Analysing the security properties of object-capability patterns." Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:98b0b6b6-eee1-45d5-b32e-d98d1085c612.
Full textAbbasi, Abdul Ghafoor. "CryptoNET : Generic Security Framework for Cloud Computing Environments." Doctoral thesis, KTH, Kommunikationssystem, CoS, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-32786.
Full textQC 20110427
Pires, Mário Rui Dias. "A type system for access control in an object-oriented language." Master's thesis, FCT - UNL, 2009. http://hdl.handle.net/10362/2308.
Full textThe need for a security system to ensure the integrity of protected data leads to the development of access control systems, whose purpose is to prevent access to protected information or resources by unauthorized individuals. In this thesis, we develop and formalize a type and effect system that verifies the access control to objects in a simplified object-oriented language. Traditionally, access control is done only at run-time, using dynamic techniques, such as access control lists, that perform run-time verifications for credentials and privileges. However, these techniques increase the total execution time of an operation, potentially breaking system requirements such as usability or response time. Static approaches, based on static analysis or type systems, reduce the amount of run-time checks by doing some of those checks during compile-time, preventing the occurrence of errors before running the program and offering formal proofs of system correctness. The type system developed in this dissertation deals with the dynamic delegation of authorizations to access objects. An authorization includes the identification of the protected object and its access policy and is considered by the type system as a first class value. As such, object types are extended with policies that reflect the current privilege associated with the object, and typing an expression can produce an effect on policies. We name this new type as user type and the respective value as user view, which contain the object’s reference and a policy to access the object. We consider privileges over objects to be the methods that can be invoked. So, a policy states what methods are available to be called. When typing a method call by an user view, we are able to verify if it was authorized, that is, if the current policy says that the method is available. This mechanism allows the removal of common security specifications from class declarations, as visibility modifiers (public, private). Furthermore, we present a soundness result for our type system. We also implemented a typechecking algorithm for our type system, resulting in a tool to verify the integrity of protected objects in a system designed in the defined programming language.
This work was supported by a CITI research grant
Broman, David. "Safety, Security, and Semantic Aspects of Equation-Based Object-Oriented Languages and Environments." Licentiate thesis, Linköping University, Linköping University, PELAB - Programming Environment Laboratory, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10134.
Full textDuring the last two decades, the interest for computer aided modeling and simulation of complex physical systems has witnessed a significant growth. The recent possibility to create acausal models, using components from different domains (e.g., electrical, mechanical, and hydraulic) enables new opportunities. Modelica is one of the most prominent equation-based object-oriented (EOO) languages that support such capabilities, including the ability to simulate both continuous- and discrete-time models, as well as mixed hybrid models. However, there are still many remaining challenges when it comes to language safety and simulation security. The problem area concerns detecting modeling errors at an early stage, so that faults can be isolated and resolved. Furthermore, to give guarantees for the absence of faults in models, the need for precise language specifications is vital, both regarding type systems and dynamic semantics.
This thesis includes five papers related to these topics. The first paper describes the informal concept of types in the Modelica language, and proposes a new concrete syntax for more precise type definitions. The second paper provides a new approach for detecting over- and under-constrained systems of equations in EOO languages, based on a concept called structural constraint delta. That approach makes use of type checking and a type inference algorithm. The third paper outlines a strategy for using abstract syntax as a middle-way between a formal and informal language specification. The fourth paper suggests and evaluates an approach for secure distributed co-simulation over wide area networks. The final paper outlines a new formal operational semantics for describing physical connections, which is based on the untyped lambda calculus. A kernel language is defined, in which real physical models are constructed and simulated.
Report code: LIU-TEK-LIC-2007:46. On the day of the defence date the status of article IV was: In Progress; The status of article V was: Manuscript.
Cheung, Yee-him, and 張貽謙. "Secure object spaces for global information retrieval (SOSGIR)." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B29869596.
Full textPati, Nishikanta Guturu Parthasarathy. "Occlusion tolerant object recognition methods for video surveillance and tracking of moving civilian vehicles." [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-5133.
Full textBooks on the topic "Security object"
Thuraisingham, B., R. Sandhu, and T. C. Ting, eds. Security for Object-Oriented Systems. London: Springer London, 1994. http://dx.doi.org/10.1007/978-1-4471-3858-7.
Full textOOPSLA (Conference) (1993 Washington, D.C.). Security for object-oriented systems: Proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. London: Springer-Verlag, 1994.
Find full textOOPSLA Conference Workshop on Security for Object-oriented Systems (1993 Washington, DC, USA). Security for Object-oriented Systems: Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-oriented Systems, Washington DC, USA, 26 September 1993. London: Springer-Verlag, 1994.
Find full textBlakley, Bob. CORBA security: An introduction to safe computing with objects. Reading, Mass: Addison-Wesley, 2000.
Find full textHsiao, David K. An object-oriented approach to security policies and their access controls for database management. Monterey, Calif: Naval Postgraduate School, 1991.
Find full textThe search for the secure base: Attachment theory and psychotherapy. Philadelphia, PA: Brunner-Routledge, 2001.
Find full textInc, ebrary, ed. Professional Cocoa application security. Indianapolis, Ind: Wiley, 2010.
Find full textde, Paula Everton G. Clustering, concurrency control, crash recovery, garbage collection, and security in object-oriented database management systems. Monterey, Calif: Naval Postgraduate School, 1991.
Find full textBennett, Stacey Patricia. An object oriented expert system for specifying computer data security requirements in an Open Systems environment. Birmingham: University of Birmingham, 1995.
Find full textExploring in security: Towards an attachment-informed psychoanalytic psychotherapy. Hove, East Sussex: Routledge, 2009.
Find full textBook chapters on the topic "Security object"
Kalantari, Reza, and Christopher H. Bryant. "Comparing the Performance of Object and Object Relational Database Systems on Objects of Varying Complexity." In Data Security and Security Data, 72–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25704-9_8.
Full textCohen, Ernie. "Object-Oriented Security Proofs." In Formal Methods, 671–74. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-95582-7_43.
Full textVaradharajan, Vijay. "Distributed Object Systems Security." In IFIP Advances in Information and Communication Technology, 305–21. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34873-5_23.
Full textAbadi, Martín. "Built-in Object Security." In ECOOP 2003 – Object-Oriented Programming, 1. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45070-2_1.
Full textBoulahia-Cuppens, N., F. Cuppens, A. Gabillon, and K. Yazdanian. "Decomposition of multilevel objects in an object-oriented database." In Computer Security — ESORICS 94, 375–402. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58618-0_75.
Full textScarioni, Carlo, and Massimo Nardone. "Business Object Security with ACLs." In Pro Spring Security, 221–77. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5052-5_7.
Full textScarioni, Carlo. "Business Object Security with ACLs." In Pro Spring Security, 205–35. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-4819-4_7.
Full textEun, Sung-Jong, and Taeg-Keun Whangbo. "Efficient Object Recognition Method for Adjacent Circular-Shape Objects." In IT Convergence and Security 2012, 911–17. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-5860-5_110.
Full textMolva, Refik, and Francoise Baude. "Panel Session: Mobile Code, Internet Security, and E-Commerce." In Object-Oriented Technology, 270–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44555-2_19.
Full textRobinson, Garry. "Object Protection and Security Measures." In Real World Microsoft Access Database Protection and Security, 363–401. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0793-1_11.
Full textConference papers on the topic "Security object"
Wagner, David. "Object capabilities for security." In the 2006 workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1134744.1134745.
Full textSommer, Lars W., Tobias Schuchert, and Jürgen Beyerer. "Generating object proposals for improved object detection in aerial images." In SPIE Security + Defence, edited by Gary Kamerman and Ove Steinvall. SPIE, 2016. http://dx.doi.org/10.1117/12.2241527.
Full textStamatescu, Victor, Sebastien Wong, Mark D. McDonnell, and David Kearney. "Learned filters for object detection in multi-object visual tracking." In SPIE Defense + Security, edited by Firooz A. Sadjadi and Abhijit Mahalanobis. SPIE, 2016. http://dx.doi.org/10.1117/12.2225200.
Full textRalph, Jason F., Scott W. Sims, and Kenneth L. Edwards. "Scene-referenced object localization." In Defense and Security, edited by Ivan Kadar. SPIE, 2004. http://dx.doi.org/10.1117/12.541494.
Full textRoshan, Aditya, and Yun Zhang. "A comparison of moving object detection methods for real-time moving object detection." In SPIE Defense + Security, edited by Daniel J. Henry, Davis A. Lange, Dale Linne von Berg, S. Danny Rajan, Thomas J. Walls, and Darrell L. Young. SPIE, 2014. http://dx.doi.org/10.1117/12.2053176.
Full textThuraisingham, Bhavani, Ravi Sandhu, and T. C. Ting. "Security for object-oriented systems." In Addendum to the proceedings. New York, New York, USA: ACM Press, 1993. http://dx.doi.org/10.1145/260303.260325.
Full textSebe, Ismail O., Suya You, and Ulrich Neumann. "Globally optimum multiple object tracking." In Defense and Security, edited by Michael K. Masten and Larry A. Stockum. SPIE, 2005. http://dx.doi.org/10.1117/12.603210.
Full textBonanno, David, Frank Pipitone, G. C. Gilbreath, Kristen Nock, Carlos A. Font, and Chadwick T. Hawley. "Object classification using tripod operators." In SPIE Defense + Security, edited by G. Charmaine Gilbreath and Chadwick Todd Hawley. SPIE, 2014. http://dx.doi.org/10.1117/12.2069529.
Full textIbrahim, Izzati, Peter Yuen, Aristeidis Tsitiridis, Kan Hong, Tong Chen, James Jackman, David James, and Mark Richardson. "Illumination independent object recognitions in hyperspectral imaging." In Security + Defence, edited by Colin Lewis, Douglas Burgess, Roberto Zamboni, François Kajzar, and Emily M. Heckman. SPIE, 2010. http://dx.doi.org/10.1117/12.864535.
Full textSirakov, Nikolay Metodiev. "Object shape extraction from cluttered bags." In SPIE Defense + Security, edited by Firooz A. Sadjadi and Abhijit Mahalanobis. SPIE, 2017. http://dx.doi.org/10.1117/12.2268810.
Full textReports on the topic "Security object"
Crocker, S., N. Freed, J. Galvin, and S. Murphy. MIME Object Security Services. RFC Editor, October 1995. http://dx.doi.org/10.17487/rfc1848.
Full textSullivan, Elisabeth C., Teresa F. Lunt, and Norman Proctor. Multilevel Object Security Model. Fort Belvoir, VA: Defense Technical Information Center, March 1986. http://dx.doi.org/10.21236/ada169187.
Full textSelander, G., J. Mattsson, F. Palombini, and L. Seitz. Object Security for Constrained RESTful Environments (OSCORE). RFC Editor, July 2019. http://dx.doi.org/10.17487/rfc8613.
Full textGilger, J., and H. Tschofenig. Report from the Smart Object Security Workshop. RFC Editor, December 2014. http://dx.doi.org/10.17487/rfc7397.
Full textLung, Teresa F. Discretionary Security for Object-Oriented Database Systems. Fort Belvoir, VA: Defense Technical Information Center, March 1991. http://dx.doi.org/10.21236/ada237573.
Full textReiter, Michael. Client Security in Scalable and Survivable Object Systems. Fort Belvoir, VA: Defense Technical Information Center, July 2005. http://dx.doi.org/10.21236/ada436342.
Full textJajodia, Sushil, and Boris Kogan. Implementation Issues in Multilevel Security for Object-Oriented Databases. Fort Belvoir, VA: Defense Technical Information Center, May 1990. http://dx.doi.org/10.21236/ada224489.
Full textJajodia, Sushil, and Boris Kogan. Integrating an Object-Oriented Data Model with Multilevel Security. Fort Belvoir, VA: Defense Technical Information Center, May 1990. http://dx.doi.org/10.21236/ada224491.
Full textHousley, R. Object Identifier Registry for the S/MIME Mail Security Working Group. RFC Editor, January 2014. http://dx.doi.org/10.17487/rfc7107.
Full textDe Paula, Everton G., and Michael L. Nelson. Clustering, Concurrency Control, Crash Recovery, Garbage Collection, and Security in Object-Oriented Database Management Systems. Fort Belvoir, VA: Defense Technical Information Center, February 1991. http://dx.doi.org/10.21236/ada235448.
Full text