Rozprawy doktorskie na temat „RBAC”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „RBAC”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Guo, Yuxia. "User/group administration for RBAC". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0001/MQ42067.pdf.
Pełny tekst źródłaKhambhammettu, Hemanth. "Enforcing complex policies in RBAC". Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529765.
Pełny tekst źródłaBuccelli, Emanuele. "Ingegnerizzazione di RBAC-MAS in TuCSoN". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8462/.
Pełny tekst źródłaDarwish, Wesam M. "Analysis of ANSI RBAC support in commercial middleware". Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/7147.
Pełny tekst źródłaMa, Mingchao. "Distributed RBAC for subscription-based remote network services". Thesis, University of Greenwich, 2007. http://gala.gre.ac.uk/6232/.
Pełny tekst źródłaRegateiro, Diogo José Domingues. "A secure, distributed and dynamic RBAC for relational applications". Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14045.
Pełny tekst źródłaNowadays, database application use tools like Java Database Connectivity, Hibernate or ADO.NET to access data stored in databases. These tools are designed to bring together the relational database and object-oriented programming paradigms, forsaking applied access control policies. Hence, the application developers must master the established policies as a means to develop software that is conformant with the established access control policies. Furthermore, there are situations where these policies can evolve dynamically. In these cases it becomes hard to adjust the access control mechanisms. This challenge has led to the development of an extension to the role based access control (RBAC) model where permissions are defined as a sequence of create, read, update and delete (CRUD) expressions that can be executed and the interfaces to access them. From these permissions it's possible to generate security artefacts on the client side, i.e. in a distributed manner, which allows the clients to access the stored data while satisfying the security policies defined. On top of this model extension, a security layer has also been created in order to make the access control secure and obligatory. For the RBAC model extension this work leverages a previous work that created a dynamic access control architecture for relational applications, here referred to as DACA (Dynamic Access Control Architecture). DACA uses business logic information and the defined access control policies to build dynamically the security artefacts for the applications. In situations where the access control policies can evolve dynamically, the security artefacts are adjusted automatically. This base work, however, defines as permissions CRUD expressions, which can be executed in any order, and needs an adequate security layer to authenticate users and protect the system form intruders. Hence, this work aims to create a new architecture, called “S-DRACA” (Secure, Dynamic and Distributed Role-based Access Control Architecture), which extends the work done with DACA so that it is capable of enforcing sequences of CRUD expressions that the applications can execute if the sequences are associated with their roles and the development of a security layer to make it secure. We discuss as well the performance of this system and its applicability to other environments outside of relational databases.
Atualmente, aplicações que acedem a bases de dados utilizam ferramentas como o Java Database Connectivity, Hibernate ou ADO.NET para aceder aos dados nelas armazenados. Estas ferramentas estão desenhadas para unir os paradigmas das bases de dados relacionais e da programação orientada a objetos, mas não estão preocupados com as políticas de controlo de acesso a aplicar. Portanto, os programadores de aplicações têm de dominar as políticas estabelecidas a fim de desenvolver aplicações em conformidade com as políticas de controlo de acesso estabelecidas.. Além disso, existem situações em que as políticas de controlo de acesso podem evoluir dinamicamente. Nestes casos, torna-se difícil adequar os mecanismos de controlo de acesso. Este desafio motivou o desenvolvimento de uma extensão ao modelo de controlo de acesso baseado em papeis (RBAC) que define como permissões sequências de expressões para criar, ler, atualizar e apagar (CRUD) informação e as interfaces de acesso a cada uma delas. A partir destas permissões podem ser gerados artefactos de segurança do lado dos clientes, i.e. de uma forma distribuída, que lhes permitem aceder à informação armazenada na base de dados segundo as políticas definidas. Por cima desta extenção também foi criada uma camada de segurança para tornar o controlo de acesso seguro e obrigatório. Para a extensão do modelo RBAC este trabalho baseou-se num trabalho anterior que criou uma arquitectura dinâmica de controlo de acesso para aplicações de bases de dados relacionais, aqui referida como DACA (Dynamic Access Control Architecture). DACA utiliza informação da lógica de negócio e as políticas de controlo de acesso que foram definidos para criar dinamicamente os artefactos de segurança para as aplicações. Em situações onde as políticas de controle de acesso evoluem de forma dinâmica, os artefactos de segurança são ajustados automaticamente. Este trabalho base, no entanto, define como permissões as expressões CRUD, podendo estas ser executadas em qualquer ordem, e necessita de uma camada de segurança adequada para autenticar utilizadores e proteger os dados sensíveis de intrusos. Portanto, neste trabalho, pretende-se criar uma nova arquitectura, chamada “S-DRACA” (Secure, Dynamic and Distributed Role-based Access Control Architecture), que estende o trabalho feito no âmbito do DACA para que este seja capaz de garantir que sejam cumpridas sequência de expressões CRUD que as aplicações podem executar e que estão associados aos seus papéis nas políticas RBAC e desenvolver uma camada de segurança adequada para a tornar segura. Discutimos, também, o seu desempenho e aplicabilidade em outros ambientes sem ser em bases de dados relacionais.
Costa, Vanderlei Ferreira da. "Autorização integrada entre portais e Globus baseada no modelo RBAC". Universidade Católica de Santos, 2008. http://biblioteca.unisantos.br:8181/handle/tede/603.
Pełny tekst źródłaPlataformas de grade computacional têm sido adotadas para promover o compartilhamento, agregação e coordenação de grandes quantidades de recursos geograficamente distribuídos e multi-institucionais. Em tais ambientes, que envolvem grandes quantidades de recursos localizados em diversos domínios administrativos e sujeitos a uma diversidade de políticas de controle de acesso, o controle de acesso é obrigatório. Como principal contribuição, o presente trabalho estende o arcabouço (framework) de portais GridSphere com o objetivo de fornecer ferramentas de controle de acesso que podem ser utilizadas para o desenvolvimento de aplicaçõess para grades computacionais. Os mecanismos e ferramentas propostos também realizam o controle de acesso no nível de invocação de serviço, que pode ser usado por qualquer aplicação compatível com OGSA que realize invocações a serviços de grade. Nossa abordagem permite a integração e consistência entre políticas de autorização aplicadas no lado do portal e no lado do provedor de serviço.
Damasceno, Carlos Diego Nascimento. "Evaluating finite state machine based testing methods on RBAC systems". Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-11112016-101158/.
Pełny tekst źródłaControle de Acesso (CA) é um dos principais pilares da segurança da informação. Em resumo, CA permite assegurar que somente usuários habilitados terão acesso aos recursos de um sistema, e somente o acesso necessário para a realização de uma dada tarefa será disponibilizado. Neste contexto, o controle de acesso baseado em papel (do inglês, Role Based Access Control - RBAC) tem se estabelecido como um dos mais importante paradigmas de controle de acesso. Em uma organização, usuários recebem responsabilidades por meio de cargos e papéis que eles exercem e, em sistemas RBAC, permissões são distribuídas por meio de papéis atribuídos aos usuários. Apesar da aparente simplicidade, enganos podem ocorrer no desenvolvimento de sistemas RBAC e gerar falhas ou até mesmo brechas de segurança. Dessa forma, processos de verificação e validação tornam-se necessários. Teste de CA visa identificar divergências entre a especificação e o comportamento apresentado por um mecanismo de CA. Teste Baseado em Modelos (TBM) é uma variante de teste de software que se baseia em modelos explícitos de especificação para automatizar a geração de casos testes. TBM tem sido aplicado com sucesso no teste funcional, entretanto, ainda existem lacunas de pesquisa no TBM de requisitos não funcionais, tais como controle de acesso, especialmente de critérios de teste. Nesta dissertação de mestrado, dois aspectos do TBM de RBAC são investigados: métodos de geração de teste baseados em Máquinas de Estados Finitos (MEF) para RBAC; e priorização de testes para RBAC. Inicialmente, dois métodos tradicionais de geração de teste, W e HSI, foram comparados ao método de teste mais recente, SPY, em um experimento usando políticas RBAC especificadas como MEFs. As características (número de resets, comprimento médio dos casos de teste e comprimento do conjunto de teste) e a efetividade dos conjuntos de teste gerados por cada método para cinco políticas RBAC foram analisadas. Posteriormente, três métodos de priorização de testes foram comparados usando os conjuntos de teste gerados no experimento anterior. Neste caso, um critério baseado em similaridade RBAC foi proposto e comparado com a priorização aleatória e baseada em similaridade simples. Os resultados obtidos mostraram que o método SPY conseguiu superar os métodos W e HSI no teste de sistemas RBAC. A similaridade RBAC também alcançou uma detecção de defeitos superior.
Goran, Sladić. "Model kontekstno zavisne kontrole pristupa u poslovnim sistemima". Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2011. http://dx.doi.org/10.2298/NS2011SLADICGORAN.
Pełny tekst źródłaAccess control is concerned with the way in which users can access to resources in the computer system. This dissertation focuses on problems of access control for business processes. The subject of the dissertation is a formal specification of the RBAC-based context sensitive access control model for business processes. By using a context-sensitive access control it is possible to define more complex access control policies whose implementation in existing access control models for business processes is not possible or is very complicated. The given model is applicable in diferent business systems, and supports the definition of access control policies for both simple and complex business processes. The model's prototype is verified by two case studies on real business processes. The presented prototype implementation represents a proof of the proposed model's practical value.
Khayat, Etienne J. "Role-based access control (RBAC) : formal modelling and risk-based administration". Thesis, London South Bank University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.435233.
Pełny tekst źródłaSingh, Arundhati 1978. "SIREN : a SQL-based implementation of role-based access control (RBAC) for enterprise networks". Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87870.
Pełny tekst źródłaIncludes bibliographical references (leaves 69-71).
by Arundhati Singh.
M.Eng.
Petrauskienė, Rasa. "Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją". Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_140213-99282.
Pełny tekst źródłaLocation-based Access Control LBAC techniques allow taking users’ physical location into account when determining their access privileges. The analysis of possibilities of integrating location information into access control and authentication is provided. I show the advantages of using location information for authentication and access control. I present location-based access control model that can increase the probability of correct authentication. I design wireless LAN location-based access control system that is used in building of several floors. The model is compliant with OGC (Open GeoSpatial Consortium) and Geo-RBAC (the extent of RBAC model); it integrates other types of location-based features. I describe the periodicity algorithm of location-based access control and design the policy enforcement algorithm that uses location mapping functions and the evaluation of confidence. The model is evaluated by testing the speed of the system and computer resources used by the system. The vulnerabilities of location-based access control are discussed in the context of sniffing, highjacking, DoS and warmhole attacks.
Landberg, Fredrik. "Flexible role-handling in command and control systems". Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7880.
Pełny tekst źródłaIn organizations the permissions a member has is not decided by their person, but by their functions within the organization. This is also the approach taken within military command and control systems. Military operations are often characterized by frictions and uncontrollable factors. People being absent when needed are one such problem.
This thesis has examined how roles are handled in three Swedish command and control systems. The result is a model for handling vacant roles with the possibility, in some situations, to override ordinary rules.
Manning, Francis Jay. "A Framework for Enforcing Role Based Access Control in Open Source Software". NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/228.
Pełny tekst źródłaFalkcrona, Jerry. "Role-based access control and single sign-on for Web services". Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11224.
Pełny tekst źródłaNowadays, the need for sharing information between different systems in a secure manner is common, not only in the corporate world but also in the military world. This information often resides at different locations, creating a distributed system. In order to share information in a secure manner in a distributed system, credentials are often used to attain authorization.
This thesis examines how such a distributed system for sharing information can be realized, using the technology readily available today. Accounting to the results of this examination a basic system is implemented, after which the overall security of the system is evaluated. The thesis then presents possible extensions and improvements that can be done in future implementations.
The result shows that dynamic roles do not easily integrate with a single sign-on system. Combining the two technologies leads to several synchronization issues, where some are non-trivial to solve.
Cáceres, Alvarez Luis Marco. "Modelo de segurança multilateral e RBAC em um ambiente de serviço no contexto de gerenciamento de contabilidade TINA". Florianópolis, SC, 2004. http://repositorio.ufsc.br/xmlui/handle/123456789/86854.
Pełny tekst źródłaMade available in DSpace on 2012-10-21T11:20:15Z (GMT). No. of bitstreams: 1 210977.pdf: 3171815 bytes, checksum: bf83468afb28c3e0d57c2322b1c8f216 (MD5)
Na área das telecomunicações, a crescente evolução e o constante desenvolvimento de novas tecnologias, aliado a fatores econômicos, tem proporcionado um grande impacto em praticamente todos os setores da sociedade. Além disso, a inexistência de padrões no setor de telecomunicações evidenciou as diferenças entre as estruturas das operadoras, onde existe uma constante introdução de novos serviços. Para atender rapidamente esta necessidade, faz-se necessário o uso de tecnologias avançadas que permitam conduzir a especificação e desenvolvimento desses serviços de uma maneira ágil e eficiente. Dentre tais tecnologias, pode se citar a orientação a objetos, reuso de componentes, sistemas distribuídos, arquitetura de serviços e, principalmente, TINA (Telecommunications Information Networking Architecture) devido à sua natureza aberta e independente de tecnologia. Os conceitos e os princípios de TINA foram elaborados com o objetivo de solucionar problemas existentes em IN (Intelligent Network), como o de controle de serviços centralizados e do modelo de dados de serviços. Nesse sentido, torna-se evidente que serviços mais complexos como multimídia e vídeo conferência precisam ser manipulados e gerenciados de uma forma mais rápida, eficiente e dinâmica. Neste contexto, TINA desenvolveu uma arquitetura detalhada para as redes de comunicações multi-serviços que permitem o intercâmbio de informações entre os usuários e os provedores em tempo real dentro de um ambiente seguro e confiável, onde o gerenciamento dos serviços TINA definidos pelas funções de gerenciamento FCAPS (Failure, Configurations, Accounting, Performance e Security) são ainda questões abertas para a pesquisa. Portanto, este trabalho de pesquisa tem como objetivo realizar um estudo e a análise deste contexto, propondo um modelo para responder as questões de segurança em um ambiente de serviço TINA. Este modelo esta principalmente relacionado com o gerenciamento de contabilidade em tempo real para múltiplos usuários e múltiplos provedores, onde os aspectos de segurança estão relacionados às políticas e mecanismos proporcionados pelos modelos de Segurança Multilateral e RBAC (Role-Based Access Control) e validado através do uso da técnica de descrição formal LOTOS e a implementação de um protótipo.
Shi, Wei, i wshi2001@yahoo com au. "An Extended Role-based Access Control Model for Enterprise Systems and Web Services". RMIT University. Computer Science and Information Technology, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070122.122429.
Pełny tekst źródłaSiebach, Jacob Aaron Jess. "The Abacus: A New Approach to Authorization". BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/9221.
Pełny tekst źródłaAlbalawi, Talal S. "A NEW APPROACH TO DYNAMIC INTEGRITY CONTROL". Kent State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=kent1460977241.
Pełny tekst źródłaLacroix, Julien. "Vers un cloud de confiance : modèles et algorithmes pour une provenance basée sur les contrôles d'accès". Thesis, Aix-Marseille, 2015. http://www.theses.fr/2015AIXM4365.
Pełny tekst źródłaThis document is the culmination of three years of thesis. Having introduced and cleared the general issue related to my thesis subject, i.e. « how to use provenance data to enforce trust in the Cloud? », I present a description of the concepts, models and languages related to my thesis and the state of the art that can partially address this issue. Secondly, I present the solution based on provenance that I bring to access controls, in distributed systems such as the Cloud: PBAC². It is based on a system combining both provenance models (PROV-DM) and access controls (generic rules of RBAC type with regimentation and regulation policies). This system uses a central execution engine denoted the mediator to enforce security and foster trust in the Cloud, via rule checking over a part of the retrospective provenance graph it received. Furthermore, I describe the study I made of three PBAC² extensions: (1) the integration of the PROV-O ontology and its pros and cons regarding the size of the (sub)graph received by the mediator; (2) the construction of the PBAC² adaptation with the regulation security approach; (3) the translation of PBAC² rules into PROV CONSTRAINTS constraints. Moreover, PBAC² is applied to a realistic example that belongs to the healthcare sector. A PBAC² prototype and a demonstration on some practical examples with a local machine and a real Cloud system illustrate the scope of this work. In conclusion of the thesis, I propose four perspectives of this work
Poniszewska, Aneta. "Spécification UML du contrôle d'accès dans les sytèmes d'information : une approche coopérative de la conception des rôles dans un modèle RBAC". Artois, 2003. http://www.theses.fr/2003ARTO0202.
Pełny tekst źródłaWe have chosen to develop the problem of access control in information system proposing a role model in the conception of a system during its evolution (i. E. Addition of new applications). Our objectives were to make easier the job of security administrator and to have the better coherence between the global security constraints in the enterprise and the different components of its information system. To make this, we used the object oriented conception defined in the UML language. We have shown how to automatically generate the roles associated to a component of information system using the UML meta-model. We have joined some concept of UML with the concepts of an extended RBAC model
Silva, Edemilson dos Santos da. "Extensão do modelo de restrições do RBAC para suportar obrigações do modelo ABC / Edemilson dos Santos da Silva ; orientador, Altair Olivo Santin". reponame:Biblioteca Digital de Teses e Dissertações da PUC_PR, 2004. http://www.biblioteca.pucpr.br/tede/tde_busca/arquivo.php?codArquivo=280.
Pełny tekst źródłaInclui bibliografia
Este trabalho apresenta uma proposta de extensão ao modelo de restrição do modelo de controle de acesso baseado em papéis (role-based access control - RBAC) para suportar situações críticas respeitando as regras da política de autorização do sistema. As s
Gunnarsson, Peter. "Role based access control in a telecommunications operations and maintenance network". Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2875.
Pełny tekst źródłaEricsson develops and builds mobile telecommunication networks. These networks consists of a large number of equipment. Each telecommunication company has a staff of administrators appointed to manage respective networks.
In this thesis, we investigate the requirements for an access control model to manage the large number of permissions and equipment in telecommunication networks. Moreover, we show that the existing models do not satisfy the identified requirements. Therefore, we propose a novel RBAC model which is adapted for these conditions.
We also investigate some of the most common used commercial tools for administrating RBAC, and evaluate their effectiveness in coping with our new proposed model. However, we find the existing tools limited, and thereby design and partly implement a RBAC managing system which is better suited to the requirements posed by our new model.
Andersson, Jerker. "Rollbaserad åtkomstkontroll med geografisk avgränsning : En systematisk litteraturgenomgång av det befintliga kunskapstillståndet inom ämnesområdet". Thesis, Högskolan Dalarna, Informatik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:du-18700.
Pełny tekst źródłaRole-based Access Control is a standardized and well established model in terms of handling access rights. However, the accepted ANSI standard 359-2004 lacks the support of geographically delimiting role authorizations. Information systems handling geographical data together with the increasing use of mobile devices call for a need to discuss such spatial aspects within the context of Role-Based Access Control. This thesis seeks to shed light on the current state of knowledge within the subject area as well as to identify aspects of it that are in need of further development. The theoretical framework conceived by the initial literature review has made the conduction of a systematic literature review possible, and the synthesis and analysis of the data together with the theoretical framework have led to the work’s contributions of knowledge: an overview of the subject where the state-of-the art in the area is presented and a structured list of desirous needs of research and development within the area of study.
Wang, Hua. "Access management in electronic commerce system". University of Southern Queensland, Faculty of Sciences, 2004. http://eprints.usq.edu.au/archive/00001522/.
Pełny tekst źródłaSubedi, Harendra. "Mathematical Modelling of Delegation in Role Based Access Control". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222381.
Pełny tekst źródłaYangui, Rahma. "Modélisation UML/B pour la validation des exigences de sécurité des règles d'exploitation ferroviaires". Thesis, Ecole centrale de Lille, 2016. http://www.theses.fr/2016ECLI0003/document.
Pełny tekst źródłaThe safety is a major issue in the development cycle of the critical systems, in particular in the rail transportation sector. This thesis aims at the modeling, the verification and at the validation of the railway operating rules with regard to the safety requirements. These rules intend to define the authorizations of trains movement on national railway lines equipped with the European Rail Traffic Management System (ERTMS). In a similar way, we find the concepts of authorizations in the description of access control policies of information systems. Consequently, our contributions concern the adaptation of an UML/B approach for the access control of information systems to model and validate the railway operating rules. At first, we adapted the Role Based Access Control (RBAC) model on a railway case study extracted from the operating rules applied on the LGV-Est-Européenne line in France. The B4MSecure platform enables the modeling of these rules by means of a UML profile of RBAC inspired by SecureUML. Then, these models are transformed into B specifications. which are enhanced by railway safety properties and formally verified and validated. In addition to the concepts of the RBAC model, the Organization Based Access Control (Or-Bac) model introduces the notion of organization, in the center of this model, and the notion of context. We have therefore proposed to use this model as extension of the RBAC model in the context of railway interoperability in ERTMS
Rondinini, Giorgia. "Role-Based Access Control in ambienti cloud multi-region". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Znajdź pełny tekst źródłaBouriche, Khalid. "Gestion de l'incertitude et codage des politiques de sécurité dans les systèmes de contrôle d'accès". Thesis, Artois, 2013. http://www.theses.fr/2013ARTO0406/document.
Pełny tekst źródłaThis thesis focuses on encoding default-based SELinux security policy in OrBAC and propose an extension of this model. We presented the state of the art of different models of access controls present in the literature underlining the limitations of each of these models. Then we presented the model OrBAC as an extension of the RBAC model, firstly because he brought the notion of context and organization and secondly it allows expressing, in addition to permissions, prohibitions and obligation. Then we presented the SELinux security solution that uses a set of access control models such as DAC, RBAC and MAC. We identified several hundreds or even thousands of rules in SELinux security policy, these rules may be access decisions or decisions of transition. We could then encode these rules in OrBAC model, and via filling its tables of entities, then transform relations OrBAC. Our thesis also reviewed the foundations of possibilistic logic, and then made an important enlargement in OrBAC model; it's to introduce an entity called "priority" in each relationship model OrBAC. The entity "priority" quantifies the certainty for concrete entity injection into the corresponding abstract entity, in general, it's meaning the degree of certainty that a relationship is performed. We proposed three modes of combination (pessimistic, optimistic and advanced) that can be adopted to determine the concrete relations priority value from priorities values of each corresponding abstract relationship. Finally, we implement, via an application developed by DELPHI, coding access decisions rules of the SELinux policy in OrBAC model introducing the priority entity
Namli, Tuncay. "Security, Privacy, Identity And Patient Consent Management Across Healthcare Enterprises Inintegrated Healthcare Enterprises (ihe) Cross Enterprise Document Sharing (xds) Affinity Domain". Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608463/index.pdf.
Pełny tekst źródłaOASIS Security Assertion Markup Language (SAML), XML Signature, Mutual Transport Layer Security (TLS), RFC 3195 Reliable Delivery for Syslog, RFC 3881 Security Audit and Access Accountability Message XML Data Definitions.
Poe, Gary A. "Privacy in Database Designs: A Role Based Approach". Scholar Commons, 2007. https://scholarcommons.usf.edu/etd/454.
Pełny tekst źródłaBoström, Erik. "Refined Access Control in a Distributed Environment". Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1020.
Pełny tekst źródłaIn the area of computer network security, standardization work has been conducted for several years. However, the sub area of access control and authorization has so far been left out of major standardizing.
This thesis explores the ongoing standardization for access control and authorization. In addition, areas and techniques supporting access control are investigated. Access control in its basic forms is described to point out the building blocks that always have to be considered when an access policy is formulated. For readers previously unfamiliar with network security a number of basic concepts are presented. An overview of access control in public networks introduces new conditions and points out standards related to access control. None of the found standards fulfills all of our requirements at current date. The overview includes a comparison between competing products, which meet most of the stated conditions.
In parallel with this report a prototype was developed. The purpose of the prototype was to depict how access control could be administered and to show the critical steps in formulating an access policy.
Pooda, Herman. "Évaluation et comparaison des modèles de contrôle d'accès". Mémoire, Université de Sherbrooke, 2015. http://hdl.handle.net/11143/8157.
Pełny tekst źródłaEl, Houri Marwa. "Un modèle formel pour exprimer des politiques dynamiques pour contrôle d'accès et négociation dans un environnement distribué". Phd thesis, Université Paul Sabatier - Toulouse III, 2010. http://tel.archives-ouvertes.fr/tel-00492317.
Pełny tekst źródłaFrausto, Bernal Paul Axayacatl. "ICARE-S2 : Infrastructure de confiance sur des architectures de réseaux pour les services de signature évoluée". Phd thesis, Télécom ParisTech, 2004. http://pastel.archives-ouvertes.fr/pastel-00000924.
Pełny tekst źródłaKatcharian, Hope. "Risk-Based Corrective Action (RBCA) at petroleum contaminated sites : the rationale for RBCA and natural attenuation". Thesis, Springfield, Va. : Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA339431.
Pełny tekst źródłaKauermann, Richard [Verfasser]. "Sinterformen von reaktionsgebundenem Aluminiumoxid (RBAO) / Richard Kauermann". Aachen : Shaker, 2007. http://d-nb.info/116651238X/34.
Pełny tekst źródłaMotta, Gustavo Henrique Matos Bezerra. "Um modelo de autorização contextual para o controle de acesso ao prontuário eletrônico do paciente em ambientes abertos e distribuídos". Universidade de São Paulo, 2004. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-05042004-152226/.
Pełny tekst źródłaThe recent advances in computing and communication technologies allowed ready access to the electronic patient record (EPR) information. High availability of clinical information raises concerns about patients privacy and data confidentiality of their data. The legal regulation mandates the confidentiality of EPR contents. Everyone has to be authorized by the patients to access their EPR, except when this access is necessary to provide care on their behalf. This work proposes MACA, a contextual authorization model for the role-based access control (RBAC) that considers the ac-cess restrictions requirements for the EPR in open and distributed environments. RBAC regulates users access to EPR based on organizational functions (roles). Con-textual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This gives flexibility and expressive power to MACA, allowing one to establish access policies for the EPR and administrative policies for the RBAC that considers the environmental and cultural diversity of healthcare organizations. MACA also allows EPR components to use RBAC transparently, making it more user friendly when compared with other RBAC models. The implementation of MACA architecture uses the LDAP (Lightweight Directory Access Protocol) directory server, the Java programming language and the standards CORBA Security Service and Re-source Access Decision Facility. Thus, heterogeneous EPR components can request user authentication and access authorization services in a unified and coherent way across multiple platforms. MACA implementation complies with free software pol-icy. It is based on software components without licensing costs and it offers good performance for the estimated access demand. Finally, the daily use of MACA to control the access of about 2000 users to the EPR at InCor-HC.FMUSP shows the feasibility of the model, of its implementation and the effectiveness of its practical application on real cases.
Báča, Petr. "RBC model - aplikace na ČR". Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-76667.
Pełny tekst źródłaSimões, David João Apolinário. "Endowing NoSQL DBMS with SQL features through call level interfaces". Master's thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/18592.
Pełny tekst źródłaOs arquitetos de software usam ferramentas, tais como Call Level Interfaces (CLI), para guardar, atualizar e retirar dados de Sistemas de Gestão de Bases de Dados (SGBD). Estas ferramentas estão desenhadas para efetuarem a junção entre os paradigmas de Base de Dados Relacional e da Programação Orientada a Objetos e fornecem funcionalidades padrão para interagir com SGBD. No entanto, a emergência do paradigma NoSQL, e particularmente de novos fornecedores de SGBD NoSQL, leva a situações onde algumas das funcionalidades padrão fornecidas por CLI não são suportadas. Isto deve-se normalmente à distância entre o modelo SQL e NoSQL, ou devido a restrições de design. Assim, quando um arquiteto de sistema precisa de evoluir, nomeadamente de um SGBD relacional para um SGBD NoSQL, tem de ultrapassar as dificuldades que emergem por existirem funcionalidades não suportadas pelo SGBD NoSQL. Não só isso, mas as CLI costumam ignorar políticas de controlo de acesso estabelecidas e, portanto, programadores de aplicações têm de dominar as ditas políticas de maneira a desenvolverem software em concordância com elas. Escolher o SGBD NoSQL errado pode levar a problemas de grandes dimensões quando as aplicações pedem funcionalidades não suportadas ou a que não têm acesso. Esta tese foca-se em implementar funcionalidades que não são comummente suportadas por SGBD NoSQL, tais como Stored Procedures, Transações, Save Points e interações com estruturas de memória local, através de uma framework baseada numa CLI padrão. O modelo de implementação de funcionalidades é definido por módulos da nossa framework, e permite a criação de sistemas distribuídos e tolerantes a falhas, que simulam as funcionalidades anteriormente referidas e abstraem as funcionalidades da base de dados subjacente de clientes. Também temos como objetivo integrar a nossa framework com trabalho anterior, a S-DRACA, uma arquitetura dinâmica e segura de controlo de acesso para aplicações relacionais, onde as permissões são definidas como sequências de expressões create, read, update e delete. Com esta integração, conseguimos fornecer Role-Based Access Control e outras funcionalidades de segurança a qualquer tipo de SGBD. Desenvolvemos várias formas de utilizar cada componente (localmente ou distribuído) e a framework está construída de forma modular, o que permite aos vários componentes serem utilizados individualmente ou em grupo, assim como permite o acrescento de funcionalidades ou SGBD adicionais por administradores de sistema que queiram adaptar a framework às suas necessidades particulares.
To store, update and retrieve data from database management systems (DBMS), software architects use tools, like call level interfaces (CLI), which provide standard functionality to interact with DBMS. These tools are designed to bring together the relational database and object-oriented programming paradigms, but the emergence of the NoSQL paradigm, and particularly new NoSQL DBMS providers, leads to situations where some of the standard functionality provided by CLI are not supported, very often due to their distance from the relational model or due to design constraints. As such, when a system architect needs to evolve, namely from a relational DBMS to a NoSQL DBMS, he must overcome the difficulties conveyed by the features not provided by the NoSQL DBMS. Not only that, but CLI usually forsake applied access control policies. As such, application developers must master the established policies as a means to develop software that is conformant with them. Choosing the wrong NoSQL DBMS risks major issues with applications requesting non-supported features and with unauthorized accesses. This thesis focuses on deploying features that are not so commonly supported by NoSQL DBMS, such as Stored Procedures, Transactions, Save Points and interactions with local memory structures, through a framework based in a standard CLI. The feature implementation model is defined by modules of our framework, and allows for distributed and fault-tolerant systems to be deployed, which simulate the previously mentioned features and abstract the underlying database features from clients. It is also our goal to integrate our framework with previous work, S-DRACA, a dynamic secure access control architecture for relational applications, where permissions are defined as a sequence of create, read, update and delete expressions. With the integration, we can provide dynamic Role-Based Access Control and other security features to any kind of DBMS. We developed several ways of using each component (locally or distributed) and the framework is built in a modular fashion, which allows several components to be used individually or together, as well as extra features or DBMS to be added by system administrators that wish to adapt the framework to their particular needs.
Law, Boon-Chuan. "UNCERTAINTY ANALYSIS FOR ROCKET-BASED COMBINED CYCLE (RBCC) SYSTEMS TESTING". MSSTATE, 2003. http://sun.library.msstate.edu/ETD-db/theses/available/etd-07152003-174339/.
Pełny tekst źródłaModebe, Emmanuel Obinna. "Extended Cr-51 RBC combined with Tc-99m RBC for the detection and localisation of occult GIT bleeding". Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86509.
Pełny tekst źródłaENGLISH ABSTRACT: Background Occult blood loss from the gastrointestinal tract (GIT), causing iron deficiency often with anaemia, can be diagnostically and therapeutically challenging. This is because the endoscopic and radiologic tests may be negative due to the slow, chronic and intermittent nature of the gastrointestinal bleeding, making timing key in detection and localisation of the bleed. These limitations can be approached using two different radioactive isotopes. Firstly, we tested the sensitivity of extending Cr-51 RBC for 21 days relative to 5 days to detect GIT bleeding and its use to optimise timing of a Tc-99m RBC study for GIT blood loss localisation. Finally, we tested if the information provided by the Tc-99m RBC study aided gastroenterologic intervention for anatomical localisation of a lesion. Method In this retrospective review, after obtaining institutional and ethics committee approval, records of patients referred for evaluation of possible GIT blood loss were reviewed. In each; daily appearance of radiochromium in stool was measured in the whole body counter. In those cases exceeding 50 ml/day, a technetium-99m (Tc-99m) localization study was performed. These studies were correlated with clinical findings. Results A total of 59 Cr-51 RBC studies were carried out in 36 females and 21 males (n = 57). In 32 (54%) the radiochromium results were positive with 75% of the bleeding incidences occurring after 5 days of stool collection. Of 17 cases in whom Tc-99m RBC imaging studies were performed, 14 (82%) were positive with specific anatomical sites successfully defined in twelve. In all patients with blood loss of >100 ml/24h, Tc-99m RBC were positive and localised. Ten of the 17 Tc-99m RBC studies were further investigated and half diagnosed with small-bowel angiodysplasia. Conclusion This sequential twin isotope method is practical in revealing otherwise silent intestinal haemorrhage. Although it has good patient acceptability and clinical as well as diagnostic utility in management, further studies are required to clearly establish a cut-off level of blood loss for performing imaging studies and the impact of the findings on the overall patient management.
AFRIKAANSE OPSOMMING: Agtergrond Die evaluasie van okkulte bloedverlies uit die gastro-intestinale kanaal (GIT), met gevolglike ystertekort anemie, kan diagnosties en terapeuties uitdagend wees. Dit is omdat endoskopiese en radiologiese ondersoeke negatief mag wees as gevolg van die stadige, chroniese en intermitterende aard van die gastro-intestinale bloeding, wat die presiese tydstip van opsporing en lokalisering van die bloeding krities belangrik maak. Hierdie beperkings kan aangespreek word deur twee verskillende radioaktiewe isotope te gebruik. Eerstens is die sensitiwiteit van die verlenging van die Cr-51 RBS studie tot 21 dae in plaas van 5 dae om die GIT bloeding op te spoor, getoets, asook die gebruik daarvan om die optimale tyd vir ‘n Tc-99m RBS studie om die GIT bloedverlies te lokaliseer, vas te stel. Laastens is getoets of die inligting van die Tc-99m RBS studie wel bygedra het tot die gastroenterologiese ingreep om die letsel anatomies te lokaliseer. Metode Na institusionele en etiese komitee toestemming is inligting van pasiënte wat vir die evaluering van ‘n moontlike GI bloedverlies verwys is, in hierdie retrospektiewe oorsig nagegaan. Die daaglikse voorkoms van radioaktiewe chroom in stoelgangmonsters is in ‘n heelliggaamteller gemeet. In gevalle waar dit 50 ml/dag oorskry het, is ‘n tegnesium 99m (Tc 99m) studie gedoen. Hierdie studies is met die kliniese bevindinge gekorreleer. Resultate ‘n Totaal van 59 Cr-51 RBS studies is in 36 vroue en 21 mans (n = 57) gedoen. Die gemerkte chroomstudies was positief in 32 (54%), met 75% van die bloedings wat meer as 5 dae na versameling van die stoelgang plaasgevind het. In veertien (82%) van die 17 gevalle waar Tc-99m RBS studies gedoen is, was die studies positief. Spesifieke anatomiese gebiede van bloeding kon in 12 hiervan suksesvol bevestig word. Tc-99m RBS studies was positief in al die pasiënte met ‘n bloedverlies van >100 ml/24h, en kon gelokaliseer word. Tien van die 17 Tc-99m RBS studies is verder ondersoek en die helfte daarvan gediagnoseer met dunderm angiodisplasie. Gevolgtrekking Die opeenvolgende twee isotoopmetode om andersins asimptomatiese dermbloeding op te spoor, is prakties uitvoerbaar. Alhoewel die studies goed deur pasiënte aanvaar is, en ook van kliniese en diagnostiese waarde in die hantering van die pasiënte is, is verdere studies nodig om die afsnypunt vir die hoeveelheid bloedverlies om beeldingstudies uit te voer, sonder twyfel vas te stel, asook om die impak van die bevindings op ‘n groter pasiëntpopulasie vas te stel.
Lee, Chang Hee. "The competitive effects of RBOC interLATA entry on local telephone markets". Columbus, Ohio : Ohio State University, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1078943781.
Pełny tekst źródłaTitle from first page of PDF file. Document formatted into pages; contains xiii, 274 p.; also includes graphics (some col). Includes abstract and vita. Advisor: Douglas N. Jones, Dept. of Public Policy and Management. Includes bibliographical references (p. 275-317).
Carneiro, Dias André Eduardo. "Study of RBC shape transitions induced by nanoparticles". Doctoral thesis, Universitat Rovira i Virgili, 2019. http://hdl.handle.net/10803/668080.
Pełny tekst źródłaEsta tesis describe el estudio de las propiedades del medio extracelular en la crioconservación de los glóbulos rojos y la posible aplicación de nanopartículas de sílice como coagentes para la entrega intracelular de trehalose, un crioprotector natural. La primera parte del estudio se centró en las condiciones de congelación y descongelación, y en las propiedades del medio extracelular para la congelación. Se analizaron diferentes propiedades de acuerdo con su influencia en la tasa de supervivencia de los glóbulos rojos, según se evaluó mediante el ensayo de hemólisis, y se analizó el efecto de la congelación mediante el análisis morfológico de las imágenes de los glóbulos rojos. La segunda parte del estudio investiga la interacción de nanopartículas de sílice, cargadas de manera diferente, con glóbulos rojos para su futura aplicación como coagente para la entrega de trehalose. La toxicidad de la nanopartícula de sílice se determinó mediante un ensayo de hemólisis y su distribución espacial se estudió mediante la obtención de imágenes de los glóbulos rojos que flotan libremente usando microscopía confocal (LSCM). Se desarrolló un nuevo método de visualización 3D de alto rendimiento que se aplicó a las imágenes LSCM para corregir la deriva en toda la pila z permitiendo el análisis de las imágenes. Los resultados se confirmaron mediante la interacción de las nanopartículas de sílice con vesículas unilamelares gigantes (GUV) como un sistema de modelo experimental.
This thesis describes the study of the properties of extracellular medium on the cryopreservation of red blood cells and the potential application of silica nanoparticles as co-agents for the intracellular delivery of trehalose, a natural cryoprotectant. The first part of the study focused on the freezing and thawing conditions, and on the properties of the extracellular medium for freezing. Different properties were analyzed according to their influence on the survival rate of red blood cells as assessed by hemolysis assay and the effect of freezing was analyzed by morphological analysis of images of red blood cells. The second part of the study investigates the interaction of differently charged silica nanoparticles with red blood cells for future application as co-agent for trehalose delivery. Silica nanoparticle toxicity was determined by hemolysis assay and their spatial distribution was studied by imaging freely floating red blood cells using laser scanning confocal microscopy (LSCM). A novel high-throughput 3D visualization method was developed and applied to LSCM images in order to correct the drift throughout the z-stack allowing the analysis of the images. Results were confirmed by interacting the silica nanoparticles with giant unilamellar vesicles (GUV) as an experimental model system.
Mendes, William Corrêa. "ARQUITETURA BASEADA EM ONTOLOGIAS DE UM AGENTE RBC". Universidade Federal do Maranhão, 2013. http://tedebc.ufma.br:8080/jspui/handle/tede/506.
Pełny tekst źródłaCase-Based Reasoning (CBR) is a problem-solving paradigm where it is possible to use knowledge from past experiences to solve new situations. The CBR agent approach that combines agent autonomy with the problem-solving model of CBR has been proven adequate for the development of complex systems. This paper proposes the architecture of a CBR agent whose main differential is the use of ontologies for representing the case base along with all the mechanisms that make up a CBR system. The proposed architecture besides promoting the reuse of the case ontology, unifies the software agent approach with CBR, a typical paradigm of human reasoning. All the CBR mechanisms are present in the proposed architecture: case representation, similarity analysis for cases retrieval, adaptation and cases learning, where the last two mechanisms are still being specified. The architecture was evaluated in the Brazilian Family Law legal domain. For that, a targeted ontology for the representation CBR cases of this area was created. The results obtained in the tests showed good effectiveness in retrieving similar cases and showing the feasibility of the architecture using the semantic model of similarity for retrieval of CBR cases.
O Raciocínio Baseado em Casos (RBC) é um paradigma de resolução de problemas no qual é possível utilizar conhecimentos de experiências passadas para resolver novas situações. A abordagem de agentes RBC que combina a autonomia dos agentes e o modelo de resolução de problemas do RBC tem se mostrado adequada para o desenvolvimento de sistemas complexos. Este trabalho propõe a arquitetura de um agente RBC cujo principal diferencial é utilizar ontologias para representar a base de casos junto com todos os mecanismos que compõem um sistema RBC. A arquitetura proposta, além de promover o reúso da ontologia de representação dos casos, unifica as abordagens de agentes de software e RBC, um paradigma de raciocínio típico dos seres humanos. Estão presentes na arquitetura os mecanismos de representação dos casos, análise de similaridade para recuperação de casos, adaptação e aprendizado de casos, estes dois últimos ainda em fase de especificação. A arquitetura foi avaliada no domínio jurídico do Direito de Família brasileiro, sendo que para isso foi criada uma ontologia, representando casos RBC nesta área. Os resultados obtidos nos testes realizados demonstraram uma boa efetividade na recuperação de casos similares e a consequente viabilidade do uso da arquitetura com o modelo de similaridade semântico utilizado para recuperação de casos RBC.
Almeida, Sara Cristina Cantarino Valente de. "An RBC model with a rich fiscal sector". Master's thesis, NSBE - UNL, 2013. http://hdl.handle.net/10362/9698.
Pełny tekst źródłaContributing to the general understanding of fiscal policy e ectiveness, this study consists in the reformulation and estimation of the DSGE model developed in Azevedo and Ercolani (2012), to measure the potential relations between the private sector and the consumption and investment components of government expenditures. The estimation results show that public consumption and capital have both a substitutability e ect on private factors. For the study of the dynamic e ects, the model is augmented with strict fiscal rules, whose imposition creates a "crowding-out" e ect of the simulated fiscal policy shocks on government consumption and investment.
Morrow, Carl. "Phylogenetic investigations of the African Restionaceae using rbc". Thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/26316.
Pełny tekst źródłaBeppler, Fabiano Duarte. "Emprego de RBC para recuperação inteligente de informações". Florianópolis, SC, 2002. http://repositorio.ufsc.br/xmlui/handle/123456789/82898.
Pełny tekst źródłaMade available in DSpace on 2012-10-19T19:18:05Z (GMT). No. of bitstreams: 1 189259.pdf: 2369619 bytes, checksum: 6081c39e99c22484b1465b896722ff2a (MD5)
A dimensão do volume de informações disponíveis na Internet e as taxas diárias de crescimento tornam cada vez mais presentes mecanismos eficientes e eficazes de recuperação de informações. A maioria dos métodos pesquisados e aplicados tem por base o tratamento das informações disponíveis nos repositórios associados aos sites. Nesta abordagem, um elemento de conhecimento é normalmente negligenciado: a memória das interações efetuadas pelos usuários que utilizaram o site previamente a um usuário atual. A construção desta memória viabiliza o emprego de interações de busca do passado na apresentação de informações desejadas no momento das consultas. A presente dissertação propõe a construção da memória das buscas aos sites na forma de casos de consulta e a aplicação de Raciocínio Baseado em Casos para utilização destas interações passadas como subsídio em novos processos de consulta. O método proposto deu origem à ferramenta RBNet. Para demonstração de sua viabilidade, RBNet foi aplicada ao site de busca do "Diretório dos Grupos de Pesquisa no Brasil", projeto do Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq). RBNet permite que usuários interessados em grupos de pesquisa possam encontrar rapidamente o que desejam, quando se valem das interações semelhantes registradas na base de casos do RBNet.
Simm, Robert. "Enhanced biological phosphorus removal using a sequencing batch RBC". Thesis, University of British Columbia, 1988. http://hdl.handle.net/2429/28517.
Pełny tekst źródłaApplied Science, Faculty of
Civil Engineering, Department of
Graduate
Tapon, Njamo Julien Serge. "Olive wastewater bioremediation using a rotating biological contactor (RBC)". Thesis, Cape Peninsula University of Technology, 2012. http://hdl.handle.net/20.500.11838/2023.
Pełny tekst źródłaThe expansion of the South African olive processing industry has brought an increased threat to the environment. More production activities lead to more wastewater generation that requires more costly treatment. Regulatory bodies concerned with the release of effluents into the environment are imposing evermore-restrictive guidelines. With this information in mind, the South African olive industry is facing a significant challenge of maintaining economic competitiveness while becoming more environmentally benign. To begin addressing this challenge, the olive processing industry must develop and implement new, more effective, tailored treatment technologies to remediate olive wastewater prior to its release into the environment. In this study, the use of indigenous olive wastewater biofilms in combination with a rotating biological contactor (RBC) was investigated for possible bioremediation purposes. The development of microbial biofilms resulted in the breakdown of the hazardous chemical compounds present in the olive wastewater, i.e. reducing the chemical oxygen demand (COD) and polyphenol content. Results showed that indigenous microorganisms within table olive and olive mill wastewater have a strong tendency to form biofilms. Furthermore, when these biofilms are applied to a small-scale RBC system, significant lower levels of both COD (on average 55% for table olive wastewater (TOWW) and 46% for olive mill wastewater (OMWW) and total phenol (on average 51% for TOWW and 39% for OMWW) were obtained. Results from shocking the biofilms with chemicals routinely used during olive processing indicates that most have a negative effect on the biofilm population, but that the biofilms are able to survive and recover in a relatively short time. This study confirms the potential application of indigenous biofilms found in olive wastewater streams for future bioremediation technologies that form the basis for the development of an eco-friendly, easy-to-manage, low cost technologies specifically designed for the small South African olive processing industry.