Добірка наукової літератури з теми "Authorization Policie"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Authorization Policie".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Authorization Policie"
Xu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, and Yaoxue Zhang. "A Feasible Fuzzy-Extended Attribute-Based Access Control Technique." Security and Communication Networks 2018 (June 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/6476315.
Повний текст джерелаSciberras, Josette, Raymond Zammit, and Patricia Vella Bonanno. "The European framework for intellectual property rights for biological medicines." Generics and Biosimilars Initiative Journal 10, no. 4 (December 15, 2021): 172–83. http://dx.doi.org/10.5639/gabij.2021.1004.022.
Повний текст джерелаBai, Yun, and Vijay Varadharajan. "On transformation of authorization policies." Data & Knowledge Engineering 45, no. 3 (June 2003): 333–57. http://dx.doi.org/10.1016/s0169-023x(02)00194-5.
Повний текст джерелаSabri, Khair Eddin. "An Algebraic Model to Analyze Role-Based Access Control Policies." Modern Applied Science 12, no. 10 (September 12, 2018): 50. http://dx.doi.org/10.5539/mas.v12n10p50.
Повний текст джерелаWANG, Qiang, Qiao LIU, and Zhi-guang QIN. "Change impact analysis in authorization policies." Journal of Computer Applications 31, no. 1 (March 21, 2011): 115–17. http://dx.doi.org/10.3724/sp.j.1087.2011.00115.
Повний текст джерелаFournet, Cédric, Andrew D. Gordon, and Sergio Maffeis. "A type discipline for authorization policies." ACM Transactions on Programming Languages and Systems 29, no. 5 (August 2, 2007): 25. http://dx.doi.org/10.1145/1275497.1275500.
Повний текст джерелаLi, Pei Wu. "The Research of Temporal-Based Authorization for Group-Centric Secure Information Sharing." Advanced Materials Research 143-144 (October 2010): 1223–27. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.1223.
Повний текст джерелаIyer, Padmavathi, and Amirreza Masoumzadeh. "Learning Relationship-Based Access Control Policies from Black-Box Systems." ACM Transactions on Privacy and Security 25, no. 3 (August 31, 2022): 1–36. http://dx.doi.org/10.1145/3517121.
Повний текст джерелаSchwartz, Aaron L., Troyen A. Brennan, Dorothea J. Verbrugge, and Joseph P. Newhouse. "Measuring the Scope of Prior Authorization Policies." JAMA Health Forum 2, no. 5 (May 28, 2021): e210859. http://dx.doi.org/10.1001/jamahealthforum.2021.0859.
Повний текст джерелаBecker, Moritz Y., and Sebastian Nanz. "A logic for state-modifying authorization policies." ACM Transactions on Information and System Security 13, no. 3 (July 2010): 1–28. http://dx.doi.org/10.1145/1805974.1805976.
Повний текст джерелаДисертації з теми "Authorization Policie"
Calzavara, Stefano <1985>. "Static verification and enforcement of authorization policies." Doctoral thesis, Università Ca' Foscari Venezia, 2013. http://hdl.handle.net/10579/3044.
Повний текст джерелаThe thesis addresses the problem of the verification and enforcement of authorization policies through static analysis techniques. The main contributions are threefold: a formal semantics for grsecurity, which allows us to effectively validate a number of desirable security properties for role-based access control systems; an extension of RCF based on affine logic, to guarantee the enforcement of expressive authorization policies predicating on resource usage bounds; a verification methodology for Android applications, targeted to the enforcement of an access control policy robust against privilege escalation attacks. All the proposed techniques are proved sound and the issues related to their practical implementation are discussed.
Truong, Anh. "Efficient Automated Security Analysis of Complex Authorization Policies." Doctoral thesis, Università degli studi di Trento, 2015. https://hdl.handle.net/11572/368624.
Повний текст джерелаChatvichienchai, Somchai. "Studies on Translating Access Authorization Policies of XML Documents." 京都大学 (Kyoto University), 2004. http://hdl.handle.net/2433/147569.
Повний текст джерелаBai, Yun, of Western Sydney Nepean University, and School of Computing and Information Technology. "On formal specification of authorization policies and their transformations : thesis." THESIS_XXX_CIT_Bai_Y.xml, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Повний текст джерелаDoctor of Philosophy (PhD)
Bai, Yun. "On formal specification of authorization policies and their transformations : thesis." Thesis, View thesis View thesis, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Повний текст джерелаBai, Yun. "On formal specification of authorization policies and their transformations : thesis /." View thesis View thesis, 2000. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030612.090157/index.html.
Повний текст джерела"A thesis submitted for the degree of Doctor of Philosophy at University of Western Sydney - Nepean." "September 2000." Bibliography : leaves 141-150.
Kibwage, Stephen Sakawa. "Role-Based Access Control Administration of Security Policies and Policy Conflict Resolution in Distributed Systems." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/30.
Повний текст джерелаLima, Paulo Ricardo Barbieri Dutra. "SGPCA SISTEMA GERENCIADOR DE POLÍTICAS DE CONTROLE DE ACESSO." Universidade Federal de Santa Maria, 2008. http://repositorio.ufsm.br/handle/1/8050.
Повний текст джерелаInformation is the most precious assets to organizations; hence it is necessary to have mechanisms to protect it and to make it available only to whom have factual permission to use it. Considering the need for protection of the information in organizations it is proposed in this work a system to manage access control policies which can be easily used, that is, it does not require any knowledge of policies codification language. Further, as the creation of new policies could generate conflicts with existent ones, this work also proposes algorithms which manage automatically, in a period of policies creation, the control of some kinds of conflicts, such as interest conflicts. As result, we have offer a Access Control Police Management System that enable that the process of generation and editing policies occurs easily and without conflicts. The reference model used in this work refers to health organizations; however this study can be applied in other fields.
A informação é o bem mais valioso para as organizações, logo deve-se ter mecanismos para que ela possa ser bem protegida e que seja disponível somente para quem tem real permissão de utilizá-la. Dado esta necessidade de proteção da informação nas organizações, propõe-se neste trabalho um sistema de gerenciamento de políticas de controle de acesso, que possa ser utilizado de forma facilitada, ou seja, não requerendo conhecimento de linguagem de codificação de políticas. Adicionalmente, como a criação de novas políticas pode gerar conflitos com as já existentes, este trabalho propõe também algoritmos que gerenciam automaticamente, em tempo de criação das políticas, o controle de alguns tipos de conflitos, tais como conflitos de interesse. Como resultado tem-se um Sistema Gerenciador de Políticas de Controle de Acesso que possibilita que o processo de geração e edição de políticas ocorra de maneira facilitada e sem conflitos. O modelo de referência utilizado neste trabalho refere-se no âmbito de organizações da saúde, mas o estudo realizado pode ser utilizado em outras áreas.
Blanc, François. "Les engagements dans le droit français des concentrations." Thesis, Paris 2, 2012. http://www.theses.fr/2012PA020059.
Повний текст джерелаAt first sight, the mergers’s control illustrates the modern role played by the State in the economy: the aim is not to organize the markets anymore, but to control from time to time one or several particular operators. The liberal State submit the companies’s merging processes to prior authorization, so as to make sure they do not negatively affect the competition. Nevertheless, in the silence of the law, everything goes as if the administration was using mergers as drivers of the markets’s reorganization. This process is evenmore subtil because it implies closely the companies themselves: everything depends on the commitments the companies offer to the administration, in order to prevent the non competitive effects of their project. These commitments are indeed undergoing a major legal change: once issued, they become a measure of economic restriction, embedded in the administration’s authorization. This process, that has been developed from the time of planned economy, suggests a certain permanency of the French law, despite the economic goals’s variation. Yet, these commitments constrain the parties about to merge: on the one hand regarding their actions towards other operators on the market, and on the other hand, regarding their relation with the administration : at the same time they direct the merger according to the stakeholders, and extend the administrative control. In short, when embedding the commitments in its act, the administration first changes the relations between the parties and the stakeholders, then follows up the relations’s execution. Thus, its intervention swifts ratione temporis, -from the merger in progress to the merger achieved, ratione personae, from the parties to the stakeholders’ operations, and ratione materia, from the merger to the market. Time has gone when the administration used to build the market directly ; now it uses to this end the companies that have to require her authorization
BARLETTA, Michele. "Authorization Policies in Security-Sensitive Web Services and Applications - Formal Modeling and Analysis." Doctoral thesis, 2012. http://hdl.handle.net/11562/398135.
Повний текст джерелаThe security of distributed service-oriented applications is crucial in several ap- plications such as e-commerce and e-governance, supporting business and administrative transactions among several parties over the Internet. Their development involves security issues ranging from authentication to the management of the access control on shared resources according to given business and legal models. The specification of security-sensitive applications spans several levels of abstraction, e.g., the protocol for exchanging messages, the set of interface functionalities, the types of the manipulated data, the workflow, the authorization policy, etc. A com- mon design paradigm in distributed applications consists of clearly separating the enforcement of policies at the authorization policy level and of the process work- flow at the workflow level of the applications, so that the interplay between these two levels is abstracted away. While such an approach is attractive because it is quite simple and permits one to reason about crucial properties of the policies un- der consideration, it does not provide the right level of abstraction to specify and reason about the way the workflow may interfere with the policies, and vice versa. For example, the creation of a certificate as a side effect of a workflow operation may enable a policy rule to fire and grant access to a certain resource; without executing the operation, the policy rule should remain inactive. Similarly, policy queries may be used as guards for workflow transitions. This thesis focuses on design-time analysis of security-sensitive applications and presents the following main contributions. As the first contribution, I developed a formal framework for the specification and automated analysis of distributed security-sensitive applications organized in two levels: one for the workflow and one for the authorization policies. I formalized the interface functionalities that allow the policy level and the workflow level to interact in a principled way so as to enable the specification of the behavior of distributed systems. As the sec- ond contribution, focusing on the authorization policy level, I proposed a logical framework called DKAL-light, based on the DKAL authorization language, suit- able to specify the dynamic aspects needed to model the communication level and capable to model some forms of human intervention (non-mechanizable activities), e.g. issuing of credentials or certificates, crucial for the correct execution of the system. As the third contribution, I developed “ad-hoc” automated verification techniques for a restricted, but useful in practice, class of secure-sensitive applications in order to solve practical instances of reachability problems I defined. I have also shown how message sequence charts and suitably defined causality graphs can drive and foster the automated verification (by SMT solvers) of security-sensitive applications. Finally, a prototype tool called WSSMT for the mechanization of the two-level framework is presented. As concrete examples, I considered industrial case studies arising in e-business and e-government area in order to show the suitability and flexibility of our approach and our prototype tool.
Книги з теми "Authorization Policie"
Colorado Commission on Higher Education. The Degree Authorization Act: Statutes and policies pertaining to authorization to operate as a postsecondary education institution and to award credits and degrees in Colorado. Denver, Colo: Colorado Commission on Higher Education, 1994.
Знайти повний текст джерелаDomestic politics and multilateral authorization for war. Chicago: University of Chicago Press, 2011.
Знайти повний текст джерелаDivision, Alaska Treasury. General investment policies: A review of the bases for the policies, including relevant objectives, factors, and standards, as well as responsibilities, authorizations, and limitations. [Juneau, Alaska]: State of Alaska, Dept. of Revenue, Treasury Division, 1990.
Знайти повний текст джерелаUS DEPARTMENT OF AGRICULTURE. Draft record of decision: North Fork Eagle Creek Wells special use authorization. New Mexico]: Forest Service, Southwestern Region, Lincoln National Forest, 2015.
Знайти повний текст джерелаUS DEPARTMENT OF AGRICULTURE. Final environmental impact statement: North Fork Eagle Creek Wells special use authorization. New Mexico]: Forest Service, Southwestern Region, Lincoln National Forest, 2015.
Знайти повний текст джерелаUS GOVERNMENT. Authorization for Use of Military Force Against Iraq Resolution of 2002. [Washington, D.C: U.S. G.P.O., 2002.
Знайти повний текст джерелаUnited States. Joint Task Force Transformation Initiative. Guide for security authorization of federal information systems: A security life cycle approach. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008.
Знайти повний текст джерелаUnited States. Congress. Senate. Committee on Governmental Affairs. District of Columbia Police Authorization and Expansion Act of 1989: Report of the Committee on Governmental Affairs, United States Senate, to accompany H.R. 1502 ... Washington: U.S. G.P.O., 1989.
Знайти повний текст джерелаUS GOVERNMENT. An Act to Amend Chapter 443 of Title 49, United States Code, to Extend the Authorization of the Aviation Insurance Program, and for Other Purposes. [Washington, D.C.?: U.S. G.P.O., 1997.
Знайти повний текст джерелаUnited States. Department of Defense. Office of the Secretary of Defense. Military power of the People's Republic of China: A report to Congress pursuant to the National Defense Authorization Act, fiscal year 2000. [Washington, D.C.?]: Office of the Secretary of Defense, 2009.
Знайти повний текст джерелаЧастини книг з теми "Authorization Policie"
Arthur, Will, David Challener, and Kenneth Goldman. "Extended Authorization (EA) Policies." In A Practical Guide to TPM 2.0, 217–48. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6584-9_14.
Повний текст джерелаBarker, Steve. "Logical Approaches to Authorization Policies." In Logic Programs, Norms and Action, 349–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29414-3_19.
Повний текст джерелаNait-Bahloul, Sarah, Emmanuel Coquery, and Mohand-Saïd Hacid. "Authorization Policies for Materialized Views." In IFIP Advances in Information and Communication Technology, 525–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30436-1_43.
Повний текст джерелаFrau, Simone, and Mohammad Torabi Dashti. "Analysis of Communicating Authorization Policies." In Security and Trust Management, 97–112. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38004-4_7.
Повний текст джерелаRuan, Chun, and Vijay Varadharajan. "Integration of Graph Based Authorization Policies." In Lecture Notes in Computer Science, 359–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11875604_42.
Повний текст джерелаFournet, Cédric, Andrew D. Gordon, and Sergio Maffeis. "A Type Discipline for Authorization Policies." In Programming Languages and Systems, 141–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31987-0_11.
Повний текст джерелаZhang, Boyun, Puneet Gill, Nelu Mihai, and Mahesh Tripunitara. "Granularity and Usability in Authorization Policies." In Communications in Computer and Information Science, 68–86. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93956-4_5.
Повний текст джерелаArdagna, C. A., E. Damiani, S. De Capitani di Vimercati, and P. Samarati. "Towards Privacy-Enhanced Authorization Policies and Languages." In Data and Applications Security XIX, 16–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11535706_2.
Повний текст джерелаBertino, Elisa, and Elena Ferrari. "Administration policies in a multipolicy authorization system." In Database Security XI, 341–55. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5_21.
Повний текст джерелаRobinson, Philip, Florian Kerschbaum, and Andreas Schaad. "From Business Process Choreography to Authorization Policies." In Data and Applications Security XX, 297–309. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11805588_21.
Повний текст джерелаТези доповідей конференцій з теми "Authorization Policie"
Becker, Moritz Y., Jason F. Mackay, and Blair Dillaway. "Abductive Authorization Credential Gathering." In 2009 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2009. http://dx.doi.org/10.1109/policy.2009.23.
Повний текст джерелаIranmanesh, Zeinab, Morteza Amini, and Rasool Jalili. "A Logic for Multi-domain Authorization Considering Administrators." In 2008 IEEE Workshop on Policies for Distributed Systems and Networks - POLICY. IEEE, 2008. http://dx.doi.org/10.1109/policy.2008.23.
Повний текст джерелаWinslett, Marianne. "Policy-Driven Distributed Authorization: Status and Prospects." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.35.
Повний текст джерелаDobmeier, Wolfgang, and Gunther Pernul. "Towards Privacy-Aware Handling of Authorizations." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.47.
Повний текст джерелаConstandache, Ionut, Daniel Olmedilla, and Frank Siebenlist. "Policy-Driven Negotiation for Authorization in the Grid." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.36.
Повний текст джерелаStihler, Maicon, Altair O. Santin, and Arlindo L. Marcon. "Managing distributed UCONabc policies with authorization assertions and policy templates." In 2015 20th IEEE Symposium on Computers and Communication (ISCC). IEEE, 2015. http://dx.doi.org/10.1109/iscc.2015.7405583.
Повний текст джерелаRosendo, Daniel, Judith Kelner, and Patrícia Endo. "A High-level Authorization Framework for Software-Defined Networks." In XXXVI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/sbrc_estendido.2018.14177.
Повний текст джерелаLaborde, Romain, Marwan Cheaito, Francois Barrere, and Abdelmalek Benzekri. "Toward Self-Contained Authorization Policies." In 2010 IEEE International Symposium on Policies for Distributed Systems and Networks. IEEE, 2010. http://dx.doi.org/10.1109/policy.2010.18.
Повний текст джерелаBartsch, Steffen, and M. Angela Sasse. "Guiding decisions on authorization policies." In the 27th Annual ACM Symposium. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2245276.2232015.
Повний текст джерелаDa Silva, Carlos Eduardo, Welkson De Medeiros, and Silvio Sampaio. "PEP4Django A Policy Enforcement Point for Python Web Applications." In IX Workshop de Gestão de Identidades Digitais. Sociedade Brasileira da Computação, 2019. http://dx.doi.org/10.5753/wgid.2019.14021.
Повний текст джерелаЗвіти організацій з теми "Authorization Policie"
Gage, B., B. Kosinski, and H. Shieh. Session Authorization Policy Element. RFC Editor, April 2003. http://dx.doi.org/10.17487/rfc3520.
Повний текст джерелаBarbir, A., O. Batuner, A. Beck, T. Chan, and H. Orman. Policy, Authorization, and Enforcement Requirements of the Open Pluggable Edge Services (OPES). RFC Editor, August 2004. http://dx.doi.org/10.17487/rfc3838.
Повний текст джерелаLavadenz, Magaly, Jongyeon Ee, Elvira Armas, and Grecya López. Leaders’ Perspectives on the Preparation of Bilingual/Dual Language Teachers. Center for Equity for English Learners, 2021. http://dx.doi.org/10.15365/ceel.policy.10.
Повний текст джерелаCochrane, C. B. Summary and Assessment Acquisition Policy Implications: National Defense Authorization Act for Fiscal Year 1993 and Department of Defense Appropriations Act for Fiscal Year 1993. Fort Belvoir, VA: Defense Technical Information Center, January 1993. http://dx.doi.org/10.21236/ada273210.
Повний текст джерелаBush, Joseph, Eileen Westervelt, Brian Clark, David Schwenk, Stephen Briggs, Daniel Shepard, Michael Cary Long, Tapan Patel, Melanie Johnson, and Eric Lynch. Installation utility monitoring and control system technical guide. Engineer Research and Development Center (U.S.), August 2022. http://dx.doi.org/10.21079/11681/45081.
Повний текст джерелаBilingual Authorization Program Standards Content Analysis White Paper. Center for Equity for English Learners, 2020. http://dx.doi.org/10.15365/ceel.statement.2020.1.
Повний текст джерела