Littérature scientifique sur le sujet « Authorization Policie »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Authorization Policie ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Authorization Policie"
Xu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren et Yaoxue Zhang. « A Feasible Fuzzy-Extended Attribute-Based Access Control Technique ». Security and Communication Networks 2018 (5 juin 2018) : 1–11. http://dx.doi.org/10.1155/2018/6476315.
Texte intégralSciberras, Josette, Raymond Zammit et Patricia Vella Bonanno. « The European framework for intellectual property rights for biological medicines ». Generics and Biosimilars Initiative Journal 10, no 4 (15 décembre 2021) : 172–83. http://dx.doi.org/10.5639/gabij.2021.1004.022.
Texte intégralBai, Yun, et Vijay Varadharajan. « On transformation of authorization policies ». Data & ; Knowledge Engineering 45, no 3 (juin 2003) : 333–57. http://dx.doi.org/10.1016/s0169-023x(02)00194-5.
Texte intégralSabri, Khair Eddin. « An Algebraic Model to Analyze Role-Based Access Control Policies ». Modern Applied Science 12, no 10 (12 septembre 2018) : 50. http://dx.doi.org/10.5539/mas.v12n10p50.
Texte intégralWANG, Qiang, Qiao LIU et Zhi-guang QIN. « Change impact analysis in authorization policies ». Journal of Computer Applications 31, no 1 (21 mars 2011) : 115–17. http://dx.doi.org/10.3724/sp.j.1087.2011.00115.
Texte intégralFournet, Cédric, Andrew D. Gordon et Sergio Maffeis. « A type discipline for authorization policies ». ACM Transactions on Programming Languages and Systems 29, no 5 (2 août 2007) : 25. http://dx.doi.org/10.1145/1275497.1275500.
Texte intégralLi, Pei Wu. « The Research of Temporal-Based Authorization for Group-Centric Secure Information Sharing ». Advanced Materials Research 143-144 (octobre 2010) : 1223–27. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.1223.
Texte intégralIyer, Padmavathi, et Amirreza Masoumzadeh. « Learning Relationship-Based Access Control Policies from Black-Box Systems ». ACM Transactions on Privacy and Security 25, no 3 (31 août 2022) : 1–36. http://dx.doi.org/10.1145/3517121.
Texte intégralSchwartz, Aaron L., Troyen A. Brennan, Dorothea J. Verbrugge et Joseph P. Newhouse. « Measuring the Scope of Prior Authorization Policies ». JAMA Health Forum 2, no 5 (28 mai 2021) : e210859. http://dx.doi.org/10.1001/jamahealthforum.2021.0859.
Texte intégralBecker, Moritz Y., et Sebastian Nanz. « A logic for state-modifying authorization policies ». ACM Transactions on Information and System Security 13, no 3 (juillet 2010) : 1–28. http://dx.doi.org/10.1145/1805974.1805976.
Texte intégralThèses sur le sujet "Authorization Policie"
Calzavara, Stefano <1985>. « Static verification and enforcement of authorization policies ». Doctoral thesis, Università Ca' Foscari Venezia, 2013. http://hdl.handle.net/10579/3044.
Texte intégralThe thesis addresses the problem of the verification and enforcement of authorization policies through static analysis techniques. The main contributions are threefold: a formal semantics for grsecurity, which allows us to effectively validate a number of desirable security properties for role-based access control systems; an extension of RCF based on affine logic, to guarantee the enforcement of expressive authorization policies predicating on resource usage bounds; a verification methodology for Android applications, targeted to the enforcement of an access control policy robust against privilege escalation attacks. All the proposed techniques are proved sound and the issues related to their practical implementation are discussed.
Truong, Anh. « Efficient Automated Security Analysis of Complex Authorization Policies ». Doctoral thesis, Università degli studi di Trento, 2015. https://hdl.handle.net/11572/368624.
Texte intégralChatvichienchai, Somchai. « Studies on Translating Access Authorization Policies of XML Documents ». 京都大学 (Kyoto University), 2004. http://hdl.handle.net/2433/147569.
Texte intégralBai, Yun, of Western Sydney Nepean University et School of Computing and Information Technology. « On formal specification of authorization policies and their transformations : thesis ». THESIS_XXX_CIT_Bai_Y.xml, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Texte intégralDoctor of Philosophy (PhD)
Bai, Yun. « On formal specification of authorization policies and their transformations : thesis ». Thesis, View thesis View thesis, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Texte intégralBai, Yun. « On formal specification of authorization policies and their transformations : thesis / ». View thesis View thesis, 2000. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030612.090157/index.html.
Texte intégral"A thesis submitted for the degree of Doctor of Philosophy at University of Western Sydney - Nepean." "September 2000." Bibliography : leaves 141-150.
Kibwage, Stephen Sakawa. « Role-Based Access Control Administration of Security Policies and Policy Conflict Resolution in Distributed Systems ». NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/30.
Texte intégralLima, Paulo Ricardo Barbieri Dutra. « SGPCA SISTEMA GERENCIADOR DE POLÍTICAS DE CONTROLE DE ACESSO ». Universidade Federal de Santa Maria, 2008. http://repositorio.ufsm.br/handle/1/8050.
Texte intégralInformation is the most precious assets to organizations; hence it is necessary to have mechanisms to protect it and to make it available only to whom have factual permission to use it. Considering the need for protection of the information in organizations it is proposed in this work a system to manage access control policies which can be easily used, that is, it does not require any knowledge of policies codification language. Further, as the creation of new policies could generate conflicts with existent ones, this work also proposes algorithms which manage automatically, in a period of policies creation, the control of some kinds of conflicts, such as interest conflicts. As result, we have offer a Access Control Police Management System that enable that the process of generation and editing policies occurs easily and without conflicts. The reference model used in this work refers to health organizations; however this study can be applied in other fields.
A informação é o bem mais valioso para as organizações, logo deve-se ter mecanismos para que ela possa ser bem protegida e que seja disponível somente para quem tem real permissão de utilizá-la. Dado esta necessidade de proteção da informação nas organizações, propõe-se neste trabalho um sistema de gerenciamento de políticas de controle de acesso, que possa ser utilizado de forma facilitada, ou seja, não requerendo conhecimento de linguagem de codificação de políticas. Adicionalmente, como a criação de novas políticas pode gerar conflitos com as já existentes, este trabalho propõe também algoritmos que gerenciam automaticamente, em tempo de criação das políticas, o controle de alguns tipos de conflitos, tais como conflitos de interesse. Como resultado tem-se um Sistema Gerenciador de Políticas de Controle de Acesso que possibilita que o processo de geração e edição de políticas ocorra de maneira facilitada e sem conflitos. O modelo de referência utilizado neste trabalho refere-se no âmbito de organizações da saúde, mas o estudo realizado pode ser utilizado em outras áreas.
Blanc, François. « Les engagements dans le droit français des concentrations ». Thesis, Paris 2, 2012. http://www.theses.fr/2012PA020059.
Texte intégralAt first sight, the mergers’s control illustrates the modern role played by the State in the economy: the aim is not to organize the markets anymore, but to control from time to time one or several particular operators. The liberal State submit the companies’s merging processes to prior authorization, so as to make sure they do not negatively affect the competition. Nevertheless, in the silence of the law, everything goes as if the administration was using mergers as drivers of the markets’s reorganization. This process is evenmore subtil because it implies closely the companies themselves: everything depends on the commitments the companies offer to the administration, in order to prevent the non competitive effects of their project. These commitments are indeed undergoing a major legal change: once issued, they become a measure of economic restriction, embedded in the administration’s authorization. This process, that has been developed from the time of planned economy, suggests a certain permanency of the French law, despite the economic goals’s variation. Yet, these commitments constrain the parties about to merge: on the one hand regarding their actions towards other operators on the market, and on the other hand, regarding their relation with the administration : at the same time they direct the merger according to the stakeholders, and extend the administrative control. In short, when embedding the commitments in its act, the administration first changes the relations between the parties and the stakeholders, then follows up the relations’s execution. Thus, its intervention swifts ratione temporis, -from the merger in progress to the merger achieved, ratione personae, from the parties to the stakeholders’ operations, and ratione materia, from the merger to the market. Time has gone when the administration used to build the market directly ; now it uses to this end the companies that have to require her authorization
BARLETTA, Michele. « Authorization Policies in Security-Sensitive Web Services and Applications - Formal Modeling and Analysis ». Doctoral thesis, 2012. http://hdl.handle.net/11562/398135.
Texte intégralThe security of distributed service-oriented applications is crucial in several ap- plications such as e-commerce and e-governance, supporting business and administrative transactions among several parties over the Internet. Their development involves security issues ranging from authentication to the management of the access control on shared resources according to given business and legal models. The specification of security-sensitive applications spans several levels of abstraction, e.g., the protocol for exchanging messages, the set of interface functionalities, the types of the manipulated data, the workflow, the authorization policy, etc. A com- mon design paradigm in distributed applications consists of clearly separating the enforcement of policies at the authorization policy level and of the process work- flow at the workflow level of the applications, so that the interplay between these two levels is abstracted away. While such an approach is attractive because it is quite simple and permits one to reason about crucial properties of the policies un- der consideration, it does not provide the right level of abstraction to specify and reason about the way the workflow may interfere with the policies, and vice versa. For example, the creation of a certificate as a side effect of a workflow operation may enable a policy rule to fire and grant access to a certain resource; without executing the operation, the policy rule should remain inactive. Similarly, policy queries may be used as guards for workflow transitions. This thesis focuses on design-time analysis of security-sensitive applications and presents the following main contributions. As the first contribution, I developed a formal framework for the specification and automated analysis of distributed security-sensitive applications organized in two levels: one for the workflow and one for the authorization policies. I formalized the interface functionalities that allow the policy level and the workflow level to interact in a principled way so as to enable the specification of the behavior of distributed systems. As the sec- ond contribution, focusing on the authorization policy level, I proposed a logical framework called DKAL-light, based on the DKAL authorization language, suit- able to specify the dynamic aspects needed to model the communication level and capable to model some forms of human intervention (non-mechanizable activities), e.g. issuing of credentials or certificates, crucial for the correct execution of the system. As the third contribution, I developed “ad-hoc” automated verification techniques for a restricted, but useful in practice, class of secure-sensitive applications in order to solve practical instances of reachability problems I defined. I have also shown how message sequence charts and suitably defined causality graphs can drive and foster the automated verification (by SMT solvers) of security-sensitive applications. Finally, a prototype tool called WSSMT for the mechanization of the two-level framework is presented. As concrete examples, I considered industrial case studies arising in e-business and e-government area in order to show the suitability and flexibility of our approach and our prototype tool.
Livres sur le sujet "Authorization Policie"
Colorado Commission on Higher Education. The Degree Authorization Act : Statutes and policies pertaining to authorization to operate as a postsecondary education institution and to award credits and degrees in Colorado. Denver, Colo : Colorado Commission on Higher Education, 1994.
Trouver le texte intégralDomestic politics and multilateral authorization for war. Chicago : University of Chicago Press, 2011.
Trouver le texte intégralDivision, Alaska Treasury. General investment policies : A review of the bases for the policies, including relevant objectives, factors, and standards, as well as responsibilities, authorizations, and limitations. [Juneau, Alaska] : State of Alaska, Dept. of Revenue, Treasury Division, 1990.
Trouver le texte intégralUS DEPARTMENT OF AGRICULTURE. Draft record of decision : North Fork Eagle Creek Wells special use authorization. New Mexico] : Forest Service, Southwestern Region, Lincoln National Forest, 2015.
Trouver le texte intégralUS DEPARTMENT OF AGRICULTURE. Final environmental impact statement : North Fork Eagle Creek Wells special use authorization. New Mexico] : Forest Service, Southwestern Region, Lincoln National Forest, 2015.
Trouver le texte intégralUS GOVERNMENT. Authorization for Use of Military Force Against Iraq Resolution of 2002. [Washington, D.C : U.S. G.P.O., 2002.
Trouver le texte intégralUnited States. Joint Task Force Transformation Initiative. Guide for security authorization of federal information systems : A security life cycle approach. Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008.
Trouver le texte intégralUnited States. Congress. Senate. Committee on Governmental Affairs. District of Columbia Police Authorization and Expansion Act of 1989 : Report of the Committee on Governmental Affairs, United States Senate, to accompany H.R. 1502 ... Washington : U.S. G.P.O., 1989.
Trouver le texte intégralUS GOVERNMENT. An Act to Amend Chapter 443 of Title 49, United States Code, to Extend the Authorization of the Aviation Insurance Program, and for Other Purposes. [Washington, D.C. ? : U.S. G.P.O., 1997.
Trouver le texte intégralUnited States. Department of Defense. Office of the Secretary of Defense. Military power of the People's Republic of China : A report to Congress pursuant to the National Defense Authorization Act, fiscal year 2000. [Washington, D.C.?] : Office of the Secretary of Defense, 2009.
Trouver le texte intégralChapitres de livres sur le sujet "Authorization Policie"
Arthur, Will, David Challener et Kenneth Goldman. « Extended Authorization (EA) Policies ». Dans A Practical Guide to TPM 2.0, 217–48. Berkeley, CA : Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6584-9_14.
Texte intégralBarker, Steve. « Logical Approaches to Authorization Policies ». Dans Logic Programs, Norms and Action, 349–73. Berlin, Heidelberg : Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29414-3_19.
Texte intégralNait-Bahloul, Sarah, Emmanuel Coquery et Mohand-Saïd Hacid. « Authorization Policies for Materialized Views ». Dans IFIP Advances in Information and Communication Technology, 525–30. Berlin, Heidelberg : Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30436-1_43.
Texte intégralFrau, Simone, et Mohammad Torabi Dashti. « Analysis of Communicating Authorization Policies ». Dans Security and Trust Management, 97–112. Berlin, Heidelberg : Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38004-4_7.
Texte intégralRuan, Chun, et Vijay Varadharajan. « Integration of Graph Based Authorization Policies ». Dans Lecture Notes in Computer Science, 359–68. Berlin, Heidelberg : Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11875604_42.
Texte intégralFournet, Cédric, Andrew D. Gordon et Sergio Maffeis. « A Type Discipline for Authorization Policies ». Dans Programming Languages and Systems, 141–56. Berlin, Heidelberg : Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31987-0_11.
Texte intégralZhang, Boyun, Puneet Gill, Nelu Mihai et Mahesh Tripunitara. « Granularity and Usability in Authorization Policies ». Dans Communications in Computer and Information Science, 68–86. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93956-4_5.
Texte intégralArdagna, C. A., E. Damiani, S. De Capitani di Vimercati et P. Samarati. « Towards Privacy-Enhanced Authorization Policies and Languages ». Dans Data and Applications Security XIX, 16–27. Berlin, Heidelberg : Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11535706_2.
Texte intégralBertino, Elisa, et Elena Ferrari. « Administration policies in a multipolicy authorization system ». Dans Database Security XI, 341–55. Boston, MA : Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5_21.
Texte intégralRobinson, Philip, Florian Kerschbaum et Andreas Schaad. « From Business Process Choreography to Authorization Policies ». Dans Data and Applications Security XX, 297–309. Berlin, Heidelberg : Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11805588_21.
Texte intégralActes de conférences sur le sujet "Authorization Policie"
Becker, Moritz Y., Jason F. Mackay et Blair Dillaway. « Abductive Authorization Credential Gathering ». Dans 2009 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2009. http://dx.doi.org/10.1109/policy.2009.23.
Texte intégralIranmanesh, Zeinab, Morteza Amini et Rasool Jalili. « A Logic for Multi-domain Authorization Considering Administrators ». Dans 2008 IEEE Workshop on Policies for Distributed Systems and Networks - POLICY. IEEE, 2008. http://dx.doi.org/10.1109/policy.2008.23.
Texte intégralWinslett, Marianne. « Policy-Driven Distributed Authorization : Status and Prospects ». Dans Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.35.
Texte intégralDobmeier, Wolfgang, et Gunther Pernul. « Towards Privacy-Aware Handling of Authorizations ». Dans Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.47.
Texte intégralConstandache, Ionut, Daniel Olmedilla et Frank Siebenlist. « Policy-Driven Negotiation for Authorization in the Grid ». Dans Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.36.
Texte intégralStihler, Maicon, Altair O. Santin et Arlindo L. Marcon. « Managing distributed UCONabc policies with authorization assertions and policy templates ». Dans 2015 20th IEEE Symposium on Computers and Communication (ISCC). IEEE, 2015. http://dx.doi.org/10.1109/iscc.2015.7405583.
Texte intégralRosendo, Daniel, Judith Kelner et Patrícia Endo. « A High-level Authorization Framework for Software-Defined Networks ». Dans XXXVI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/sbrc_estendido.2018.14177.
Texte intégralLaborde, Romain, Marwan Cheaito, Francois Barrere et Abdelmalek Benzekri. « Toward Self-Contained Authorization Policies ». Dans 2010 IEEE International Symposium on Policies for Distributed Systems and Networks. IEEE, 2010. http://dx.doi.org/10.1109/policy.2010.18.
Texte intégralBartsch, Steffen, et M. Angela Sasse. « Guiding decisions on authorization policies ». Dans the 27th Annual ACM Symposium. New York, New York, USA : ACM Press, 2012. http://dx.doi.org/10.1145/2245276.2232015.
Texte intégralDa Silva, Carlos Eduardo, Welkson De Medeiros et Silvio Sampaio. « PEP4Django A Policy Enforcement Point for Python Web Applications ». Dans IX Workshop de Gestão de Identidades Digitais. Sociedade Brasileira da Computação, 2019. http://dx.doi.org/10.5753/wgid.2019.14021.
Texte intégralRapports d'organisations sur le sujet "Authorization Policie"
Gage, B., B. Kosinski et H. Shieh. Session Authorization Policy Element. RFC Editor, avril 2003. http://dx.doi.org/10.17487/rfc3520.
Texte intégralBarbir, A., O. Batuner, A. Beck, T. Chan et H. Orman. Policy, Authorization, and Enforcement Requirements of the Open Pluggable Edge Services (OPES). RFC Editor, août 2004. http://dx.doi.org/10.17487/rfc3838.
Texte intégralLavadenz, Magaly, Jongyeon Ee, Elvira Armas et Grecya López. Leaders’ Perspectives on the Preparation of Bilingual/Dual Language Teachers. Center for Equity for English Learners, 2021. http://dx.doi.org/10.15365/ceel.policy.10.
Texte intégralCochrane, C. B. Summary and Assessment Acquisition Policy Implications : National Defense Authorization Act for Fiscal Year 1993 and Department of Defense Appropriations Act for Fiscal Year 1993. Fort Belvoir, VA : Defense Technical Information Center, janvier 1993. http://dx.doi.org/10.21236/ada273210.
Texte intégralBush, Joseph, Eileen Westervelt, Brian Clark, David Schwenk, Stephen Briggs, Daniel Shepard, Michael Cary Long, Tapan Patel, Melanie Johnson et Eric Lynch. Installation utility monitoring and control system technical guide. Engineer Research and Development Center (U.S.), août 2022. http://dx.doi.org/10.21079/11681/45081.
Texte intégralBilingual Authorization Program Standards Content Analysis White Paper. Center for Equity for English Learners, 2020. http://dx.doi.org/10.15365/ceel.statement.2020.1.
Texte intégral