Literatura académica sobre el tema "Authorization Policie"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Authorization Policie".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Authorization Policie"
Xu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren y Yaoxue Zhang. "A Feasible Fuzzy-Extended Attribute-Based Access Control Technique". Security and Communication Networks 2018 (5 de junio de 2018): 1–11. http://dx.doi.org/10.1155/2018/6476315.
Texto completoSciberras, Josette, Raymond Zammit y Patricia Vella Bonanno. "The European framework for intellectual property rights for biological medicines". Generics and Biosimilars Initiative Journal 10, n.º 4 (15 de diciembre de 2021): 172–83. http://dx.doi.org/10.5639/gabij.2021.1004.022.
Texto completoBai, Yun y Vijay Varadharajan. "On transformation of authorization policies". Data & Knowledge Engineering 45, n.º 3 (junio de 2003): 333–57. http://dx.doi.org/10.1016/s0169-023x(02)00194-5.
Texto completoSabri, Khair Eddin. "An Algebraic Model to Analyze Role-Based Access Control Policies". Modern Applied Science 12, n.º 10 (12 de septiembre de 2018): 50. http://dx.doi.org/10.5539/mas.v12n10p50.
Texto completoWANG, Qiang, Qiao LIU y Zhi-guang QIN. "Change impact analysis in authorization policies". Journal of Computer Applications 31, n.º 1 (21 de marzo de 2011): 115–17. http://dx.doi.org/10.3724/sp.j.1087.2011.00115.
Texto completoFournet, Cédric, Andrew D. Gordon y Sergio Maffeis. "A type discipline for authorization policies". ACM Transactions on Programming Languages and Systems 29, n.º 5 (2 de agosto de 2007): 25. http://dx.doi.org/10.1145/1275497.1275500.
Texto completoLi, Pei Wu. "The Research of Temporal-Based Authorization for Group-Centric Secure Information Sharing". Advanced Materials Research 143-144 (octubre de 2010): 1223–27. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.1223.
Texto completoIyer, Padmavathi y Amirreza Masoumzadeh. "Learning Relationship-Based Access Control Policies from Black-Box Systems". ACM Transactions on Privacy and Security 25, n.º 3 (31 de agosto de 2022): 1–36. http://dx.doi.org/10.1145/3517121.
Texto completoSchwartz, Aaron L., Troyen A. Brennan, Dorothea J. Verbrugge y Joseph P. Newhouse. "Measuring the Scope of Prior Authorization Policies". JAMA Health Forum 2, n.º 5 (28 de mayo de 2021): e210859. http://dx.doi.org/10.1001/jamahealthforum.2021.0859.
Texto completoBecker, Moritz Y. y Sebastian Nanz. "A logic for state-modifying authorization policies". ACM Transactions on Information and System Security 13, n.º 3 (julio de 2010): 1–28. http://dx.doi.org/10.1145/1805974.1805976.
Texto completoTesis sobre el tema "Authorization Policie"
Calzavara, Stefano <1985>. "Static verification and enforcement of authorization policies". Doctoral thesis, Università Ca' Foscari Venezia, 2013. http://hdl.handle.net/10579/3044.
Texto completoThe thesis addresses the problem of the verification and enforcement of authorization policies through static analysis techniques. The main contributions are threefold: a formal semantics for grsecurity, which allows us to effectively validate a number of desirable security properties for role-based access control systems; an extension of RCF based on affine logic, to guarantee the enforcement of expressive authorization policies predicating on resource usage bounds; a verification methodology for Android applications, targeted to the enforcement of an access control policy robust against privilege escalation attacks. All the proposed techniques are proved sound and the issues related to their practical implementation are discussed.
Truong, Anh. "Efficient Automated Security Analysis of Complex Authorization Policies". Doctoral thesis, Università degli studi di Trento, 2015. https://hdl.handle.net/11572/368624.
Texto completoChatvichienchai, Somchai. "Studies on Translating Access Authorization Policies of XML Documents". 京都大学 (Kyoto University), 2004. http://hdl.handle.net/2433/147569.
Texto completoBai, Yun, of Western Sydney Nepean University y School of Computing and Information Technology. "On formal specification of authorization policies and their transformations : thesis". THESIS_XXX_CIT_Bai_Y.xml, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Texto completoDoctor of Philosophy (PhD)
Bai, Yun. "On formal specification of authorization policies and their transformations : thesis". Thesis, View thesis View thesis, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Texto completoBai, Yun. "On formal specification of authorization policies and their transformations : thesis /". View thesis View thesis, 2000. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030612.090157/index.html.
Texto completo"A thesis submitted for the degree of Doctor of Philosophy at University of Western Sydney - Nepean." "September 2000." Bibliography : leaves 141-150.
Kibwage, Stephen Sakawa. "Role-Based Access Control Administration of Security Policies and Policy Conflict Resolution in Distributed Systems". NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/30.
Texto completoLima, Paulo Ricardo Barbieri Dutra. "SGPCA SISTEMA GERENCIADOR DE POLÍTICAS DE CONTROLE DE ACESSO". Universidade Federal de Santa Maria, 2008. http://repositorio.ufsm.br/handle/1/8050.
Texto completoInformation is the most precious assets to organizations; hence it is necessary to have mechanisms to protect it and to make it available only to whom have factual permission to use it. Considering the need for protection of the information in organizations it is proposed in this work a system to manage access control policies which can be easily used, that is, it does not require any knowledge of policies codification language. Further, as the creation of new policies could generate conflicts with existent ones, this work also proposes algorithms which manage automatically, in a period of policies creation, the control of some kinds of conflicts, such as interest conflicts. As result, we have offer a Access Control Police Management System that enable that the process of generation and editing policies occurs easily and without conflicts. The reference model used in this work refers to health organizations; however this study can be applied in other fields.
A informação é o bem mais valioso para as organizações, logo deve-se ter mecanismos para que ela possa ser bem protegida e que seja disponível somente para quem tem real permissão de utilizá-la. Dado esta necessidade de proteção da informação nas organizações, propõe-se neste trabalho um sistema de gerenciamento de políticas de controle de acesso, que possa ser utilizado de forma facilitada, ou seja, não requerendo conhecimento de linguagem de codificação de políticas. Adicionalmente, como a criação de novas políticas pode gerar conflitos com as já existentes, este trabalho propõe também algoritmos que gerenciam automaticamente, em tempo de criação das políticas, o controle de alguns tipos de conflitos, tais como conflitos de interesse. Como resultado tem-se um Sistema Gerenciador de Políticas de Controle de Acesso que possibilita que o processo de geração e edição de políticas ocorra de maneira facilitada e sem conflitos. O modelo de referência utilizado neste trabalho refere-se no âmbito de organizações da saúde, mas o estudo realizado pode ser utilizado em outras áreas.
Blanc, François. "Les engagements dans le droit français des concentrations". Thesis, Paris 2, 2012. http://www.theses.fr/2012PA020059.
Texto completoAt first sight, the mergers’s control illustrates the modern role played by the State in the economy: the aim is not to organize the markets anymore, but to control from time to time one or several particular operators. The liberal State submit the companies’s merging processes to prior authorization, so as to make sure they do not negatively affect the competition. Nevertheless, in the silence of the law, everything goes as if the administration was using mergers as drivers of the markets’s reorganization. This process is evenmore subtil because it implies closely the companies themselves: everything depends on the commitments the companies offer to the administration, in order to prevent the non competitive effects of their project. These commitments are indeed undergoing a major legal change: once issued, they become a measure of economic restriction, embedded in the administration’s authorization. This process, that has been developed from the time of planned economy, suggests a certain permanency of the French law, despite the economic goals’s variation. Yet, these commitments constrain the parties about to merge: on the one hand regarding their actions towards other operators on the market, and on the other hand, regarding their relation with the administration : at the same time they direct the merger according to the stakeholders, and extend the administrative control. In short, when embedding the commitments in its act, the administration first changes the relations between the parties and the stakeholders, then follows up the relations’s execution. Thus, its intervention swifts ratione temporis, -from the merger in progress to the merger achieved, ratione personae, from the parties to the stakeholders’ operations, and ratione materia, from the merger to the market. Time has gone when the administration used to build the market directly ; now it uses to this end the companies that have to require her authorization
BARLETTA, Michele. "Authorization Policies in Security-Sensitive Web Services and Applications - Formal Modeling and Analysis". Doctoral thesis, 2012. http://hdl.handle.net/11562/398135.
Texto completoThe security of distributed service-oriented applications is crucial in several ap- plications such as e-commerce and e-governance, supporting business and administrative transactions among several parties over the Internet. Their development involves security issues ranging from authentication to the management of the access control on shared resources according to given business and legal models. The specification of security-sensitive applications spans several levels of abstraction, e.g., the protocol for exchanging messages, the set of interface functionalities, the types of the manipulated data, the workflow, the authorization policy, etc. A com- mon design paradigm in distributed applications consists of clearly separating the enforcement of policies at the authorization policy level and of the process work- flow at the workflow level of the applications, so that the interplay between these two levels is abstracted away. While such an approach is attractive because it is quite simple and permits one to reason about crucial properties of the policies un- der consideration, it does not provide the right level of abstraction to specify and reason about the way the workflow may interfere with the policies, and vice versa. For example, the creation of a certificate as a side effect of a workflow operation may enable a policy rule to fire and grant access to a certain resource; without executing the operation, the policy rule should remain inactive. Similarly, policy queries may be used as guards for workflow transitions. This thesis focuses on design-time analysis of security-sensitive applications and presents the following main contributions. As the first contribution, I developed a formal framework for the specification and automated analysis of distributed security-sensitive applications organized in two levels: one for the workflow and one for the authorization policies. I formalized the interface functionalities that allow the policy level and the workflow level to interact in a principled way so as to enable the specification of the behavior of distributed systems. As the sec- ond contribution, focusing on the authorization policy level, I proposed a logical framework called DKAL-light, based on the DKAL authorization language, suit- able to specify the dynamic aspects needed to model the communication level and capable to model some forms of human intervention (non-mechanizable activities), e.g. issuing of credentials or certificates, crucial for the correct execution of the system. As the third contribution, I developed “ad-hoc” automated verification techniques for a restricted, but useful in practice, class of secure-sensitive applications in order to solve practical instances of reachability problems I defined. I have also shown how message sequence charts and suitably defined causality graphs can drive and foster the automated verification (by SMT solvers) of security-sensitive applications. Finally, a prototype tool called WSSMT for the mechanization of the two-level framework is presented. As concrete examples, I considered industrial case studies arising in e-business and e-government area in order to show the suitability and flexibility of our approach and our prototype tool.
Libros sobre el tema "Authorization Policie"
Colorado Commission on Higher Education. The Degree Authorization Act: Statutes and policies pertaining to authorization to operate as a postsecondary education institution and to award credits and degrees in Colorado. Denver, Colo: Colorado Commission on Higher Education, 1994.
Buscar texto completoDomestic politics and multilateral authorization for war. Chicago: University of Chicago Press, 2011.
Buscar texto completoDivision, Alaska Treasury. General investment policies: A review of the bases for the policies, including relevant objectives, factors, and standards, as well as responsibilities, authorizations, and limitations. [Juneau, Alaska]: State of Alaska, Dept. of Revenue, Treasury Division, 1990.
Buscar texto completoUS DEPARTMENT OF AGRICULTURE. Draft record of decision: North Fork Eagle Creek Wells special use authorization. New Mexico]: Forest Service, Southwestern Region, Lincoln National Forest, 2015.
Buscar texto completoUS DEPARTMENT OF AGRICULTURE. Final environmental impact statement: North Fork Eagle Creek Wells special use authorization. New Mexico]: Forest Service, Southwestern Region, Lincoln National Forest, 2015.
Buscar texto completoUS GOVERNMENT. Authorization for Use of Military Force Against Iraq Resolution of 2002. [Washington, D.C: U.S. G.P.O., 2002.
Buscar texto completoUnited States. Joint Task Force Transformation Initiative. Guide for security authorization of federal information systems: A security life cycle approach. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008.
Buscar texto completoUnited States. Congress. Senate. Committee on Governmental Affairs. District of Columbia Police Authorization and Expansion Act of 1989: Report of the Committee on Governmental Affairs, United States Senate, to accompany H.R. 1502 ... Washington: U.S. G.P.O., 1989.
Buscar texto completoUS GOVERNMENT. An Act to Amend Chapter 443 of Title 49, United States Code, to Extend the Authorization of the Aviation Insurance Program, and for Other Purposes. [Washington, D.C.?: U.S. G.P.O., 1997.
Buscar texto completoUnited States. Department of Defense. Office of the Secretary of Defense. Military power of the People's Republic of China: A report to Congress pursuant to the National Defense Authorization Act, fiscal year 2000. [Washington, D.C.?]: Office of the Secretary of Defense, 2009.
Buscar texto completoCapítulos de libros sobre el tema "Authorization Policie"
Arthur, Will, David Challener y Kenneth Goldman. "Extended Authorization (EA) Policies". En A Practical Guide to TPM 2.0, 217–48. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6584-9_14.
Texto completoBarker, Steve. "Logical Approaches to Authorization Policies". En Logic Programs, Norms and Action, 349–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29414-3_19.
Texto completoNait-Bahloul, Sarah, Emmanuel Coquery y Mohand-Saïd Hacid. "Authorization Policies for Materialized Views". En IFIP Advances in Information and Communication Technology, 525–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30436-1_43.
Texto completoFrau, Simone y Mohammad Torabi Dashti. "Analysis of Communicating Authorization Policies". En Security and Trust Management, 97–112. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38004-4_7.
Texto completoRuan, Chun y Vijay Varadharajan. "Integration of Graph Based Authorization Policies". En Lecture Notes in Computer Science, 359–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11875604_42.
Texto completoFournet, Cédric, Andrew D. Gordon y Sergio Maffeis. "A Type Discipline for Authorization Policies". En Programming Languages and Systems, 141–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31987-0_11.
Texto completoZhang, Boyun, Puneet Gill, Nelu Mihai y Mahesh Tripunitara. "Granularity and Usability in Authorization Policies". En Communications in Computer and Information Science, 68–86. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93956-4_5.
Texto completoArdagna, C. A., E. Damiani, S. De Capitani di Vimercati y P. Samarati. "Towards Privacy-Enhanced Authorization Policies and Languages". En Data and Applications Security XIX, 16–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11535706_2.
Texto completoBertino, Elisa y Elena Ferrari. "Administration policies in a multipolicy authorization system". En Database Security XI, 341–55. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5_21.
Texto completoRobinson, Philip, Florian Kerschbaum y Andreas Schaad. "From Business Process Choreography to Authorization Policies". En Data and Applications Security XX, 297–309. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11805588_21.
Texto completoActas de conferencias sobre el tema "Authorization Policie"
Becker, Moritz Y., Jason F. Mackay y Blair Dillaway. "Abductive Authorization Credential Gathering". En 2009 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2009. http://dx.doi.org/10.1109/policy.2009.23.
Texto completoIranmanesh, Zeinab, Morteza Amini y Rasool Jalili. "A Logic for Multi-domain Authorization Considering Administrators". En 2008 IEEE Workshop on Policies for Distributed Systems and Networks - POLICY. IEEE, 2008. http://dx.doi.org/10.1109/policy.2008.23.
Texto completoWinslett, Marianne. "Policy-Driven Distributed Authorization: Status and Prospects". En Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.35.
Texto completoDobmeier, Wolfgang y Gunther Pernul. "Towards Privacy-Aware Handling of Authorizations". En Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.47.
Texto completoConstandache, Ionut, Daniel Olmedilla y Frank Siebenlist. "Policy-Driven Negotiation for Authorization in the Grid". En Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.36.
Texto completoStihler, Maicon, Altair O. Santin y Arlindo L. Marcon. "Managing distributed UCONabc policies with authorization assertions and policy templates". En 2015 20th IEEE Symposium on Computers and Communication (ISCC). IEEE, 2015. http://dx.doi.org/10.1109/iscc.2015.7405583.
Texto completoRosendo, Daniel, Judith Kelner y Patrícia Endo. "A High-level Authorization Framework for Software-Defined Networks". En XXXVI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/sbrc_estendido.2018.14177.
Texto completoLaborde, Romain, Marwan Cheaito, Francois Barrere y Abdelmalek Benzekri. "Toward Self-Contained Authorization Policies". En 2010 IEEE International Symposium on Policies for Distributed Systems and Networks. IEEE, 2010. http://dx.doi.org/10.1109/policy.2010.18.
Texto completoBartsch, Steffen y M. Angela Sasse. "Guiding decisions on authorization policies". En the 27th Annual ACM Symposium. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2245276.2232015.
Texto completoDa Silva, Carlos Eduardo, Welkson De Medeiros y Silvio Sampaio. "PEP4Django A Policy Enforcement Point for Python Web Applications". En IX Workshop de Gestão de Identidades Digitais. Sociedade Brasileira da Computação, 2019. http://dx.doi.org/10.5753/wgid.2019.14021.
Texto completoInformes sobre el tema "Authorization Policie"
Gage, B., B. Kosinski y H. Shieh. Session Authorization Policy Element. RFC Editor, abril de 2003. http://dx.doi.org/10.17487/rfc3520.
Texto completoBarbir, A., O. Batuner, A. Beck, T. Chan y H. Orman. Policy, Authorization, and Enforcement Requirements of the Open Pluggable Edge Services (OPES). RFC Editor, agosto de 2004. http://dx.doi.org/10.17487/rfc3838.
Texto completoLavadenz, Magaly, Jongyeon Ee, Elvira Armas y Grecya López. Leaders’ Perspectives on the Preparation of Bilingual/Dual Language Teachers. Center for Equity for English Learners, 2021. http://dx.doi.org/10.15365/ceel.policy.10.
Texto completoCochrane, C. B. Summary and Assessment Acquisition Policy Implications: National Defense Authorization Act for Fiscal Year 1993 and Department of Defense Appropriations Act for Fiscal Year 1993. Fort Belvoir, VA: Defense Technical Information Center, enero de 1993. http://dx.doi.org/10.21236/ada273210.
Texto completoBush, Joseph, Eileen Westervelt, Brian Clark, David Schwenk, Stephen Briggs, Daniel Shepard, Michael Cary Long, Tapan Patel, Melanie Johnson y Eric Lynch. Installation utility monitoring and control system technical guide. Engineer Research and Development Center (U.S.), agosto de 2022. http://dx.doi.org/10.21079/11681/45081.
Texto completoBilingual Authorization Program Standards Content Analysis White Paper. Center for Equity for English Learners, 2020. http://dx.doi.org/10.15365/ceel.statement.2020.1.
Texto completo