Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: RBAC.

Rozprawy doktorskie na temat „RBAC”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „RBAC”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Guo, Yuxia. "User/group administration for RBAC." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0001/MQ42067.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Khambhammettu, Hemanth. "Enforcing complex policies in RBAC." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529765.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Buccelli, Emanuele. "Ingegnerizzazione di RBAC-MAS in TuCSoN." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8462/.

Pełny tekst źródła
Streszczenie:
L'obiettivo della tesi è la creazione di un'infrastruttura di tipo RBAC (Role Based Access Control), adibita al controllo degli accessi all'interno del linguaggio di coordinazione TuCSoN. Il punto di partenza si basa sull'analisi del lavoro sviluppato dall'Ing. Galassi: "Modello di sicurezza e controllo di accesso in una infrastruttura di coordinazione: architettura e implementazione". Usando questa come base teorica di partenza, si sono estrapolati i concetti chiave e si è data vita ad un'implementazione funzionante e di semplice utilizzo di RBAC in TuCSoN.
Style APA, Harvard, Vancouver, ISO itp.
4

Darwish, Wesam M. "Analysis of ANSI RBAC support in commercial middleware." Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/7147.

Pełny tekst źródła
Streszczenie:
This thesis analyzes the access control architectures of three middleware technologies: Common Object Request Broker Architecture (CORBA), Enterprise Java Beans (EJB), and Component Object Model (COM+). For all technologies under study, we formalize the protection state of their corresponding authorization architectures in a more precise and less ambiguous language than their respective specifications. We also suggest algorithms that define the semantics of authorization decisions in CORBA, EJB, and COM+. Using the formalized protection state configurations, we analyze the level of support for
Style APA, Harvard, Vancouver, ISO itp.
5

Ma, Mingchao. "Distributed RBAC for subscription-based remote network services." Thesis, University of Greenwich, 2007. http://gala.gre.ac.uk/6232/.

Pełny tekst źródła
Streszczenie:
The problems of identity management inherent in distributed subscription-based resource sharing are investigated in this thesis. The thesis introduces a concept of authentication delegation and distributed RBAC (DRBAC) to support fine granular access control across multiple autonomous resource sites and subscribing sites. The DRBAC model extends the RBAC model to a distributed environment. A prototype system based on the concepts of authentication delegation and distributed role and the distributed RBAC model has been implemented and tested. Access is allowed based on the distributed roles, su
Style APA, Harvard, Vancouver, ISO itp.
6

Regateiro, Diogo José Domingues. "A secure, distributed and dynamic RBAC for relational applications." Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14045.

Pełny tekst źródła
Streszczenie:
Mestrado em Engenharia de Computadores e Telemática<br>Nowadays, database application use tools like Java Database Connectivity, Hibernate or ADO.NET to access data stored in databases. These tools are designed to bring together the relational database and object-oriented programming paradigms, forsaking applied access control policies. Hence, the application developers must master the established policies as a means to develop software that is conformant with the established access control policies. Furthermore, there are situations where these policies can evolve dynamically. In these cases
Style APA, Harvard, Vancouver, ISO itp.
7

Squarcina, Marco <1984&gt. "Granalyze: towards the automatic verification of Grsecurity RBAC policies." Master's Degree Thesis, Università Ca' Foscari Venezia, 2014. http://hdl.handle.net/10579/4729.

Pełny tekst źródła
Streszczenie:
Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy specifications arising from system administrators' needs, formally verifying that access control systems enforce some defined security invariants is a problem of crucial importance. In a previous work which has been accepted for presentation at IEEE CSF 2012, we developed a framework for the formal verification of Grsecurity RBAC, an access control system developed on top of Unix/Linux systems. In this thesis we improve the framework by considering the intera
Style APA, Harvard, Vancouver, ISO itp.
8

Costa, Vanderlei Ferreira da. "Autorização integrada entre portais e Globus baseada no modelo RBAC." Universidade Católica de Santos, 2008. http://biblioteca.unisantos.br:8181/handle/tede/603.

Pełny tekst źródła
Streszczenie:
Made available in DSpace on 2015-02-04T21:45:26Z (GMT). No. of bitstreams: 1 Vanderlei Costa.pdf: 1535805 bytes, checksum: 1edf57ffedf62a0db7a4c94312b486d6 (MD5) Previous issue date: 2008-10-03<br>Plataformas de grade computacional têm sido adotadas para promover o compartilhamento, agregação e coordenação de grandes quantidades de recursos geograficamente distribuídos e multi-institucionais. Em tais ambientes, que envolvem grandes quantidades de recursos localizados em diversos domínios administrativos e sujeitos a uma diversidade de políticas de controle de acesso, o controle de acesso é
Style APA, Harvard, Vancouver, ISO itp.
9

Damasceno, Carlos Diego Nascimento. "Evaluating finite state machine based testing methods on RBAC systems." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-11112016-101158/.

Pełny tekst źródła
Streszczenie:
Access Control (AC) is a major pillar in software security. In short, AC ensures that only intended users can access resources and only the required access to accomplish some task will be given. In this context, Role Based Access Control (RBAC) has been established as one of the most important paradigms of access control. In an organization, users receive responsibilities and privileges through roles and, in AC systems implementing RBAC, permissions are granted through roles assigned to users. Despite the apparent simplicity, mistakes can occur during the development of RBAC systems and lead t
Style APA, Harvard, Vancouver, ISO itp.
10

Goran, Sladić. "Model kontekstno zavisne kontrole pristupa u poslovnim sistemima." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2011. http://dx.doi.org/10.2298/NS2011SLADICGORAN.

Pełny tekst źródła
Streszczenie:
Kontrola pristupa odnosno autorizacija, u &scaron;irem smislu, razmatra na koji način korisnici mogu pristupiti resursima računarskog sistema i na koji način ih koristiti. Ova disertacija se bavi problemima kontrole pristupa u poslovnim sistemima. Tema disertacije je formalna specifkacija modela kontekstno zavisne kontrole pristupa u poslovnim sistemima koji je baziran na RBAC modelu kontrole pristupa. Uvođenjem kontekstno zavisne kontrole pristupa omogućeno je defnisanje složenijih prava pristupa koje u postojećim modelima kontrole pristupa za poslovne sisteme nije bilo moguće realizovati ili
Style APA, Harvard, Vancouver, ISO itp.
11

Khayat, Etienne J. "Role-based access control (RBAC) : formal modelling and risk-based administration." Thesis, London South Bank University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.435233.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Singh, Arundhati 1978. "SIREN : a SQL-based implementation of role-based access control (RBAC) for enterprise networks." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87870.

Pełny tekst źródła
Streszczenie:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.<br>Includes bibliographical references (leaves 69-71).<br>by Arundhati Singh.<br>M.Eng.
Style APA, Harvard, Vancouver, ISO itp.
13

Petrauskienė, Rasa. "Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_140213-99282.

Pełny tekst źródła
Streszczenie:
Tobulėjant mobilioms technologijoms vietos informacija tapo svarbi prieigos valdymui. Šiame darbe analizuojamos vietos informacijos derinimo su autentifikacijos ir prieigos valdymo mechanizmais galimybės. Darbe išskirti vietos informacijos įvedimo į autentifikacijos, prieigos valdymo ir atskaitomybės procesus privalumai. Pristatomas vietos informacija paremtas prieigos prie tinklo resursų valdymo modelis, kuris leidžia padidinti teisingo autentifikavimo tikimybę bei išplėsti prieigos valdymo galimybes. Suprojektuota prieigos prie bevielio tinklo valdymo sistema, pritaikyta veikti kelių aukštų
Style APA, Harvard, Vancouver, ISO itp.
14

Landberg, Fredrik. "Flexible role-handling in command and control systems." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7880.

Pełny tekst źródła
Streszczenie:
<p>In organizations the permissions a member has is not decided by their person, but by their functions within the organization. This is also the approach taken within military command and control systems. Military operations are often characterized by frictions and uncontrollable factors. People being absent when needed are one such problem.</p><p>This thesis has examined how roles are handled in three Swedish command and control systems. The result is a model for handling vacant roles with the possibility, in some situations, to override ordinary rules.</p>
Style APA, Harvard, Vancouver, ISO itp.
15

Manning, Francis Jay. "A Framework for Enforcing Role Based Access Control in Open Source Software." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/228.

Pełny tekst źródła
Streszczenie:
While Role Based Access Control (RBAC) has been a popular topic of research over the last several years, there are some gaps in the literature that have been waiting to be addressed. One of these gaps involves the application of RBAC to free and open source software (FOSS). With the prevalence of FOSS in most information systems growing rapidly, there is a need to be able to provide a level of confidence that the software will not compromise the data integrity of an environment, nor will it enable the violation of established access controls. Additionally, when utilizing FOSS software it is de
Style APA, Harvard, Vancouver, ISO itp.
16

Falkcrona, Jerry. "Role-based access control and single sign-on for Web services." Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11224.

Pełny tekst źródła
Streszczenie:
<p>Nowadays, the need for sharing information between different systems in a secure manner is common, not only in the corporate world but also in the military world. This information often resides at different locations, creating a distributed system. In order to share information in a secure manner in a distributed system, credentials are often used to attain authorization.</p><p>This thesis examines how such a distributed system for sharing information can be realized, using the technology readily available today. Accounting to the results of this examination a basic system is implemented, a
Style APA, Harvard, Vancouver, ISO itp.
17

Cáceres, Alvarez Luis Marco. "Modelo de segurança multilateral e RBAC em um ambiente de serviço no contexto de gerenciamento de contabilidade TINA." Florianópolis, SC, 2004. http://repositorio.ufsc.br/xmlui/handle/123456789/86854.

Pełny tekst źródła
Streszczenie:
Tese (doutorado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduação em Ciência da Computação.<br>Made available in DSpace on 2012-10-21T11:20:15Z (GMT). No. of bitstreams: 1 210977.pdf: 3171815 bytes, checksum: bf83468afb28c3e0d57c2322b1c8f216 (MD5)<br>Na área das telecomunicações, a crescente evolução e o constante desenvolvimento de novas tecnologias, aliado a fatores econômicos, tem proporcionado um grande impacto em praticamente todos os setores da sociedade. Além disso, a inexistência de padrões no setor de telecomunicações evidenciou as diferenças e
Style APA, Harvard, Vancouver, ISO itp.
18

Shi, Wei, and wshi2001@yahoo com au. "An Extended Role-based Access Control Model for Enterprise Systems and Web Services." RMIT University. Computer Science and Information Technology, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070122.122429.

Pełny tekst źródła
Streszczenie:
This thesis intends to develop application-level access control models to address several major security issues in enterprise environments. The first goal is to provide simple and efficient authorization specifications to reduce the complexity of security management. The second goal is to provide dynamic access control for Web service applications. The third goal is to provide an access control framework for Semantic Web services. In this thesis, an Authorization-Function-Based Role-based Access Control (FB-RBAC) model is proposed for controlling enterprise systems at the applicati
Style APA, Harvard, Vancouver, ISO itp.
19

Siebach, Jacob Aaron Jess. "The Abacus: A New Approach to Authorization." BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/9221.

Pełny tekst źródła
Streszczenie:
The purpose of this thesis is to investigate the implementation of digital authorization for computer systems, specifically how to implement an efficient and secure authorization engine that uses policies and attributes to calculate authorization. The architecture for the authorization engine is discussed, the efficiency of the engine is characterized by various tests, and the security model is reviewed against other presently existing models. The resulting efforts showed an increase in efficiency of almost two orders of magnitude, along with a reduction in the amount of processing power req
Style APA, Harvard, Vancouver, ISO itp.
20

Albalawi, Talal S. "A NEW APPROACH TO DYNAMIC INTEGRITY CONTROL." Kent State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=kent1460977241.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Lacroix, Julien. "Vers un cloud de confiance : modèles et algorithmes pour une provenance basée sur les contrôles d'accès." Thesis, Aix-Marseille, 2015. http://www.theses.fr/2015AIXM4365.

Pełny tekst źródła
Streszczenie:
Ce document constitue l'aboutissement de trois années de thèse. Après avoir introduit et dégagé la problématique générale se rapportant à mon sujet de thèse, à savoir « comment utiliser les données de provenance pour favoriser un Cloud de confiance ? », je présente une description des concepts, modèles et langages se rapportant à ma thèse et l'état de l'art qui peut répondre en partie à cette problématique. En second lieu, je présente la solution basée sur la provenance que j'apporte aux contrôles d'accès, dans les systèmes distribués comme le Cloud : PBAC². Elle repose sur un système combinan
Style APA, Harvard, Vancouver, ISO itp.
22

Poniszewska, Aneta. "Spécification UML du contrôle d'accès dans les sytèmes d'information : une approche coopérative de la conception des rôles dans un modèle RBAC." Artois, 2003. http://www.theses.fr/2003ARTO0202.

Pełny tekst źródła
Streszczenie:
Nous avons choisi d'aborder le problème du contrôle d'accès d'un problème d'information en proposant un modèle de rôle dès la conception de celui-ci et tout au long de son évolution (i. E. Ajouts de nouvelles applications). Nos objectifs étaient d'une part de faciliter le travail de l'administrateur de sécurité et d'autre part d'avoir une meilleure cohérence entre les contraintes globales de sécurité de l'entreprise et les différents composants de son système d'information. Pour ce faire, nous avons utilisé une conception orientée décrite dans le langage UML. Nous avons montré comment gérer au
Style APA, Harvard, Vancouver, ISO itp.
23

Silva, Edemilson dos Santos da. "Extensão do modelo de restrições do RBAC para suportar obrigações do modelo ABC / Edemilson dos Santos da Silva ; orientador, Altair Olivo Santin." reponame:Biblioteca Digital de Teses e Dissertações da PUC_PR, 2004. http://www.biblioteca.pucpr.br/tede/tde_busca/arquivo.php?codArquivo=280.

Pełny tekst źródła
Streszczenie:
Dissertação (mestrado) - Pontifícia Universidade Católica do Paraná, Curitiba, 2004<br>Inclui bibliografia<br>Este trabalho apresenta uma proposta de extensão ao modelo de restrição do modelo de controle de acesso baseado em papéis (role-based access control - RBAC) para suportar situações críticas respeitando as regras da política de autorização do sistema. As s
Style APA, Harvard, Vancouver, ISO itp.
24

Gunnarsson, Peter. "Role based access control in a telecommunications operations and maintenance network." Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2875.

Pełny tekst źródła
Streszczenie:
<p>Ericsson develops and builds mobile telecommunication networks. These networks consists of a large number of equipment. Each telecommunication company has a staff of administrators appointed to manage respective networks. </p><p>In this thesis, we investigate the requirements for an access control model to manage the large number of permissions and equipment in telecommunication networks. Moreover, we show that the existing models do not satisfy the identified requirements. Therefore, we propose a novel RBAC model which is adapted for these conditions. </p><p>We also investigate some of the
Style APA, Harvard, Vancouver, ISO itp.
25

Andersson, Jerker. "Rollbaserad åtkomstkontroll med geografisk avgränsning : En systematisk litteraturgenomgång av det befintliga kunskapstillståndet inom ämnesområdet." Thesis, Högskolan Dalarna, Informatik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:du-18700.

Pełny tekst źródła
Streszczenie:
Rollbaserad åtkomstkontroll är en standardiserad och väl etablerad modell för att hantera åtkomsträttigheter i informationssystem. Den vedertagna ANSI-standarden 359-2004 saknar dock stöd för att geografiskt avgränsa rollbehörigheter. Informationssystem som behandlar geografiska data och de senaste årens ökade spridning av mobila enheter påkallar ett behov av att sådana rumsliga aspekter diskuteras inom kontexten av rollbaserad åtkomstkontroll. Arbetet syftar till att bringa klarhet i hur det befintliga kunskapstillståndet inom ämnesområdet rollbaserad åtkomst kontroll med geografisk avgränsni
Style APA, Harvard, Vancouver, ISO itp.
26

Wang, Hua. "Access management in electronic commerce system." University of Southern Queensland, Faculty of Sciences, 2004. http://eprints.usq.edu.au/archive/00001522/.

Pełny tekst źródła
Streszczenie:
The definition of Electronic commerce is the use of electronic transmission mediums to engage in the exchange, including buying and selling, of products and services requiring transportation, either physically or digitally, from location to location. Electronic commerce systems, including mobile e-commerce, are widely used since 1990. The number of world-wide Internet users tripled between 1993 and 1995 to 60 million, and by 2000 there were 250 million users. More than one hundred countries have Internet access. Electronic commerce, especial mobile e-commerce systems, allows their users to acc
Style APA, Harvard, Vancouver, ISO itp.
27

Subedi, Harendra. "Mathematical Modelling of Delegation in Role Based Access Control." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222381.

Pełny tekst źródła
Streszczenie:
One of the most widespread access control model that assigns permissions to a user is Role Based Access Control (RBAC). The basic idea is to limit the access to resources by using the indirection of roles, which are associated both to users and permissions. There has been research conducted with respect to clarifying RBAC and its components, as well as in creating mathematical models describing different aspects of its administrative issues in RBAC. But, till date no work has been done in terms of formalization (Mathematical Modelling) of delegation and revocation of roles in RBAC. Which provi
Style APA, Harvard, Vancouver, ISO itp.
28

Yangui, Rahma. "Modélisation UML/B pour la validation des exigences de sécurité des règles d'exploitation ferroviaires." Thesis, Ecole centrale de Lille, 2016. http://www.theses.fr/2016ECLI0003/document.

Pełny tekst źródła
Streszczenie:
La sécurité est un enjeu majeur dans le cycle de développement des systèmes critiques, notamment dans le secteur du transport ferroviaire. Cette thèse vise la modélisation, la vérification et la validation des règles d'exploitation ferroviaires au regard des exigences de sécurité. Ces règles ont pour but de définir les autorisations de déplacement des trains sur des lignes ferroviaires nationales équipées du système européen de gestion du trafic ferroviaire (ERTMS). De manière analogue, on trouve les concepts liés aux autorisations dans la description des politiques de contrôle d'accès des sys
Style APA, Harvard, Vancouver, ISO itp.
29

Rondinini, Giorgia. "Role-Based Access Control in ambienti cloud multi-region." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Znajdź pełny tekst źródła
Streszczenie:
Negli ultimi anni si è assistito a un incremento dell'uso del cloud, con cambiamenti nel tipo di servizi distribuiti tramite esso e nel tipo di infrastruttura utilizzata per supportare tali servizi. Il comprensibile desiderio di migliorare i servizi offerti, diminuendo però i costi di gestione e manutenzione, sta portando infatti all'utilizzo di infrastrutture cloud eterogenee, spesso distribuite su più aree geografiche. Tale eterogeneità delle infrastrutture rende complicato garantire la sicurezza dei sistemi, in un mondo in cui gli attacchi informatici sono sempre più diffusi ed è sempre più
Style APA, Harvard, Vancouver, ISO itp.
30

Bouriche, Khalid. "Gestion de l'incertitude et codage des politiques de sécurité dans les systèmes de contrôle d'accès." Thesis, Artois, 2013. http://www.theses.fr/2013ARTO0406/document.

Pełny tekst źródła
Streszczenie:
La présente thèse s'intéresse à coder la politique de sécurité SELinux en OrBAC et à proposer une extension de ce modèle. Nous avons commencé par présenter l'état de l'art des différents modèles de contrôles d'accès présents dans la littérature en mettant en exergue les limites de chacun de ces modèles. Ensuite nous avons présenté le modèle OrBAC comme étant une extension du modèle RBAC, car d'une part il a apporté la notion de contexte et d'organisation et d'autre part il permet d'exprimer, en plus des permissions, des interdictions et des obligations. Ensuite, nous avons présenté la solution
Style APA, Harvard, Vancouver, ISO itp.
31

Namli, Tuncay. "Security, Privacy, Identity And Patient Consent Management Across Healthcare Enterprises Inintegrated Healthcare Enterprises (ihe) Cross Enterprise Document Sharing (xds) Affinity Domain." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608463/index.pdf.

Pełny tekst źródła
Streszczenie:
Integrated Healthcare Enterprise (IHE) is an initiative by industry and healthcare professionals to improve knowledge sharing and interoperability between healthcare related enterprises. IHE publishes Integration Profiles on several Healthcare Fields to define how systems can use existing standards and technologies to execute a specific use case in healthcare. Cross Enterprise Document Sharing (XDS) is such a profile which defines the way of sharing Electronic Health Records (EHR) between healthcare enterprises. In this thesis, IHE Cross Enterprise User Authentication, IHE Node Authentication
Style APA, Harvard, Vancouver, ISO itp.
32

Poe, Gary A. "Privacy in Database Designs: A Role Based Approach." Scholar Commons, 2007. https://scholarcommons.usf.edu/etd/454.

Pełny tekst źródła
Streszczenie:
Privacy concerns have always been present in every society. The introduction of information technology information has enabled a reduction in the cost of gathering information, management of that information and the permitted that same information to become increasingly portable. Coupled with these reductions of cost has been an increase in the demand for information as well as the concern that privacy expectations be respected and enforced through security systems that safeguard access to private-type data. Security systems enforce privacy expectations. Unfortunately there is no consensus on
Style APA, Harvard, Vancouver, ISO itp.
33

Boström, Erik. "Refined Access Control in a Distributed Environment." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1020.

Pełny tekst źródła
Streszczenie:
<p>In the area of computer network security, standardization work has been conducted for several years. However, the sub area of access control and authorization has so far been left out of major standardizing. </p><p>This thesis explores the ongoing standardization for access control and authorization. In addition, areas and techniques supporting access control are investigated. Access control in its basic forms is described to point out the building blocks that always have to be considered when an access policy is formulated. For readers previously unfamiliar with network security a number o
Style APA, Harvard, Vancouver, ISO itp.
34

Pooda, Herman. "Évaluation et comparaison des modèles de contrôle d'accès." Mémoire, Université de Sherbrooke, 2015. http://hdl.handle.net/11143/8157.

Pełny tekst źródła
Streszczenie:
La protection des données et de la vie privée des personnes est devenue aujourd’hui un enjeu majeur pour les entreprises et les organisations gouvernementales qui collectent et entreposent les données à caractère personnel. L’adoption d’une politique de sécurité est un impératif. Plusieurs modèles de contrôle d’accès sont proposés dans la littérature pour guider les utilisateurs dans la mise en oeuvre de leurs politiques de sécurité. Chacun de ces modèles a ses forces et faiblesses. Les systèmes de contrôle d’accès mis en place s’érigent souvent en de véritables obstacles, rendant ineffi
Style APA, Harvard, Vancouver, ISO itp.
35

El, Houri Marwa. "Un modèle formel pour exprimer des politiques dynamiques pour contrôle d'accès et négociation dans un environnement distribué." Phd thesis, Université Paul Sabatier - Toulouse III, 2010. http://tel.archives-ouvertes.fr/tel-00492317.

Pełny tekst źródła
Streszczenie:
L'objectif principal de cette thèse est de définir un langage logique de haut niveau qui permet l'expression de politiques de sécurité complexes au sein d'un modèle de contrôle d'accès. Le développement de ce langage se fait en trois temps. Dans un premier temps nous présentons un modèle dynamique basé sur les rôles. Ainsi, nous considérons que l'évolution de l'état de sécurité d'un service dépend de l'exécution de ses fonctionnalités. Dans un deuxième temps nous définissons un formalisme basé sur les attributs qui offre plus de flexibilité en termes de spécifications des conditions de contrôl
Style APA, Harvard, Vancouver, ISO itp.
36

Frausto, Bernal Paul Axayacatl. "ICARE-S2 : Infrastructure de confiance sur des architectures de réseaux pour les services de signature évoluée." Phd thesis, Télécom ParisTech, 2004. http://pastel.archives-ouvertes.fr/pastel-00000924.

Pełny tekst źródła
Streszczenie:
Actuellement, de plus en plus d'ordinateurs sont interconnectés à l'Internet ou à des réseaux locaux. Il est donc indispensable de partager et de protéger l'information de façon performante. Pour accélérer et favoriser le développement de nouvelles applications et services autour des transactions électroniques, la sécurité devient une priorité. L'infrastructure de gestion de clés (IGC) est une réponse conçue pour assurer la sécurité des transactions électroniques et permettre l'échange de renseignements sensibles entre des parties qui n'ont pas établi au préalable de liens. La signature électr
Style APA, Harvard, Vancouver, ISO itp.
37

Katcharian, Hope. "Risk-Based Corrective Action (RBCA) at petroleum contaminated sites : the rationale for RBCA and natural attenuation." Thesis, Springfield, Va. : Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA339431.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Kauermann, Richard [Verfasser]. "Sinterformen von reaktionsgebundenem Aluminiumoxid (RBAO) / Richard Kauermann." Aachen : Shaker, 2007. http://d-nb.info/116651238X/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Motta, Gustavo Henrique Matos Bezerra. "Um modelo de autorização contextual para o controle de acesso ao prontuário eletrônico do paciente em ambientes abertos e distribuídos." Universidade de São Paulo, 2004. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-05042004-152226/.

Pełny tekst źródła
Streszczenie:
Os recentes avanços nas tecnologias de comunicação e computação viabilizaram o pronto acesso às informações do prontuário eletrônico do paciente (PEP). O potencial de difusão de informações clínicas resultante suscita preocupações acerca da priva-cidade do paciente e da confidencialidade de seus dados. As normas presentes na legislação dispõem que o conteúdo do prontuário deve ser sigiloso, não cabendo o acesso a ele sem a prévia autorização do paciente, salvo quando necessário para be-neficiá-lo. Este trabalho propõe o MACA, um modelo de autorização contextual para o controle de acesso basead
Style APA, Harvard, Vancouver, ISO itp.
40

Báča, Petr. "RBC model - aplikace na ČR." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-76667.

Pełny tekst źródła
Streszczenie:
The diploma thesis deals with the basic Real Business Cycle (RBC) model. RBC theory provides pure supply-side explanation of economic fluctuations. Generaly acknowledged contribution of RBC theory is the fact that the model is developed strictly on microeconomic basis. The thesis consists of two basic parts, theoretical and practical. First, historical background of RBC theory is mentioned. Then the basic RBC model is step-by-step derived and all equations are provided with explanations. In the last theoretical part section RBC theory critisism is discussed. In the practical part the derived b
Style APA, Harvard, Vancouver, ISO itp.
41

Simões, David João Apolinário. "Endowing NoSQL DBMS with SQL features through call level interfaces." Master's thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/18592.

Pełny tekst źródła
Streszczenie:
Mestrado em Engenharia de Computadores e Telemática<br>Os arquitetos de software usam ferramentas, tais como Call Level Interfaces (CLI), para guardar, atualizar e retirar dados de Sistemas de Gestão de Bases de Dados (SGBD). Estas ferramentas estão desenhadas para efetuarem a junção entre os paradigmas de Base de Dados Relacional e da Programação Orientada a Objetos e fornecem funcionalidades padrão para interagir com SGBD. No entanto, a emergência do paradigma NoSQL, e particularmente de novos fornecedores de SGBD NoSQL, leva a situações onde algumas das funcionalidades padrão forneci
Style APA, Harvard, Vancouver, ISO itp.
42

Law, Boon-Chuan. "UNCERTAINTY ANALYSIS FOR ROCKET-BASED COMBINED CYCLE (RBCC) SYSTEMS TESTING." MSSTATE, 2003. http://sun.library.msstate.edu/ETD-db/theses/available/etd-07152003-174339/.

Pełny tekst źródła
Streszczenie:
General uncertainty analysis was used to evaluate the performance of a Rocket-Based Combined Cycle (RBCC) engine system. To estimate the uncertainties of test results, uncertainties of basic measurements such as temperature, pressure, mass flow rate, and thrust were determined. The desired test results of interest included specific impulse and characteristic velocity. Various possible test facilities were reviewed to obtain background information and example test run conditions. Based on the test run conditions, five methods of determining specific impulse were evaluated. Also, theoretical and
Style APA, Harvard, Vancouver, ISO itp.
43

Modebe, Emmanuel Obinna. "Extended Cr-51 RBC combined with Tc-99m RBC for the detection and localisation of occult GIT bleeding." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86509.

Pełny tekst źródła
Streszczenie:
Thesis (MMed)--Stellenbosch University, 2014.<br>ENGLISH ABSTRACT: Background Occult blood loss from the gastrointestinal tract (GIT), causing iron deficiency often with anaemia, can be diagnostically and therapeutically challenging. This is because the endoscopic and radiologic tests may be negative due to the slow, chronic and intermittent nature of the gastrointestinal bleeding, making timing key in detection and localisation of the bleed. These limitations can be approached using two different radioactive isotopes. Firstly, we tested the sensitivity of extending Cr-51 RBC for 21 days rela
Style APA, Harvard, Vancouver, ISO itp.
44

Lee, Chang Hee. "The competitive effects of RBOC interLATA entry on local telephone markets." Columbus, Ohio : Ohio State University, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1078943781.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--Ohio State University, 2004.<br>Title from first page of PDF file. Document formatted into pages; contains xiii, 274 p.; also includes graphics (some col). Includes abstract and vita. Advisor: Douglas N. Jones, Dept. of Public Policy and Management. Includes bibliographical references (p. 275-317).
Style APA, Harvard, Vancouver, ISO itp.
45

Jadidi, Mansoor. "Numerical and Experimental Model of Healthy and Damaged Red Blood Cell Trajectories in Micro-channels." Thesis, Griffith University, 2023. http://hdl.handle.net/10072/421347.

Pełny tekst źródła
Streszczenie:
Motivation: Red blood cells (RBCs) are the most common cells in the blood due to their high concentration. The RBC has a deformable membrane enclosing a jelly-like fluid known as the cytosol. For many years, the dynamics of RBCs has attracted growing interest both numerically and experimentally in various fields of research on biological systems. Owing to their high deformability, RBCs exhibit complex dynamic behaviours in micro-vessels where Reynolds numbers (Re) are less than unity (Re < 1). First, a healthy RBC at a low shear rate or a high viscosity contrast (λ - defined as the ratio of vi
Style APA, Harvard, Vancouver, ISO itp.
46

Carneiro, Dias André Eduardo. "Study of RBC shape transitions induced by nanoparticles." Doctoral thesis, Universitat Rovira i Virgili, 2019. http://hdl.handle.net/10803/668080.

Pełny tekst źródła
Streszczenie:
Aquesta tesi descriu l'estudi de les propietats del medi extracel·lular sobre la criopreservació de glòbuls vermells i la possible aplicació de nanopartícules de sílice com a co-agents per al lliurament intracel·lular de trehalosa, un crioprotector natural. La primera part de l™estudi es va centrar en les condicions de congelació i descongelació i en les propietats del medi extracel·lular per a la congelació. Es van analitzar diferents propietats segons la seva influència en la taxa de supervivència dels glòbuls vermells, que es va avaluar mitjançant l™assaig d™hemòlisi i es va analitzar l™efe
Style APA, Harvard, Vancouver, ISO itp.
47

Mendes, William Corrêa. "ARQUITETURA BASEADA EM ONTOLOGIAS DE UM AGENTE RBC." Universidade Federal do Maranhão, 2013. http://tedebc.ufma.br:8080/jspui/handle/tede/506.

Pełny tekst źródła
Streszczenie:
Made available in DSpace on 2016-08-17T14:53:25Z (GMT). No. of bitstreams: 1 dissertacao William.pdf: 3403982 bytes, checksum: cac96344d66257744889562ee1b77235 (MD5) Previous issue date: 2013-11-04<br>Case-Based Reasoning (CBR) is a problem-solving paradigm where it is possible to use knowledge from past experiences to solve new situations. The CBR agent approach that combines agent autonomy with the problem-solving model of CBR has been proven adequate for the development of complex systems. This paper proposes the architecture of a CBR agent whose main differential is the use of ontologi
Style APA, Harvard, Vancouver, ISO itp.
48

Almeida, Sara Cristina Cantarino Valente de. "An RBC model with a rich fiscal sector." Master's thesis, NSBE - UNL, 2013. http://hdl.handle.net/10362/9698.

Pełny tekst źródła
Streszczenie:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Economics from the NOVA – School of Business and Economics<br>Contributing to the general understanding of fiscal policy e ectiveness, this study consists in the reformulation and estimation of the DSGE model developed in Azevedo and Ercolani (2012), to measure the potential relations between the private sector and the consumption and investment components of government expenditures. The estimation results show that public consumption and capital have both a substitutability e ect on private factors. For
Style APA, Harvard, Vancouver, ISO itp.
49

Morrow, Carl. "Phylogenetic investigations of the African Restionaceae using rbc." Thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/26316.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Beppler, Fabiano Duarte. "Emprego de RBC para recuperação inteligente de informações." Florianópolis, SC, 2002. http://repositorio.ufsc.br/xmlui/handle/123456789/82898.

Pełny tekst źródła
Streszczenie:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduação em Engenharia de Produção.<br>Made available in DSpace on 2012-10-19T19:18:05Z (GMT). No. of bitstreams: 1 189259.pdf: 2369619 bytes, checksum: 6081c39e99c22484b1465b896722ff2a (MD5)<br>A dimensão do volume de informações disponíveis na Internet e as taxas diárias de crescimento tornam cada vez mais presentes mecanismos eficientes e eficazes de recuperação de informações. A maioria dos métodos pesquisados e aplicados tem por base o tratamento das informações disponíveis nos repositóri
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!